ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • CIS Critical Security Controls - Accelerated & Simplified

    Sponsored by: AlienVault

    The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.

  • 5 Security Controls for an Effective Security Operations Center (SOC)

    Sponsored by: AlienVault

    Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • 4 Steps to Developing a Proactive Security Program

    Sponsored by: Dell SecureWorks

    The harsh truth of security today is reactive strategies are outdated and it's time to switch gears to a proactive defense. This paper outlines the discrete layers and levels needed for a proactive security strategy. Inside, learn how to shift from a reactive to a proactive defense in 4 simple steps.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Formulate a Game Plan for Closing the SecOps Gap

    Sponsored by: BMC

    Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Windows Security Management: What's New in Windows 10

    Sponsored by: LogRhythm, Inc.

    In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.

  • A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching

    Sponsored by: BitSight

    This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.

  • The Value of Threat Modelling

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.

  • The Forrester Wave: Information Security Consulting Services

    Sponsored by: IBM

    This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.

  • 15-Step Checklist for Reducing Mobile Security Risks

    Sponsored by: Lenovo

    This checklist is designed to help you identify key steps in minimizing the risks associated with mobile devices. Uncover 15 ways to assess your current mobile security plans and identify aspects that may need more attention.

  • Redefining the Mission of Mobile Authentication

    Sponsored by: Aruba Networks

    Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.

  • Vendor Comparisons for Fifteen SIEM Products

    Sponsored by: IBM

    This Gartner report can help you navigate the multitude of SIEM options available in today's marketplace and select the one that's right for you. Take a look to learn the strengths, weaknesses, and capabilities of fifteen leading SIEM products.

  • Norton Cyber Security Insights Report – UK Insights

    Sponsored by: ComputerWeekly.com

    More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.

  • A Guide to Email Security for Mid-sized Businesses

    Sponsored by: LogicNow

    In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.

  • Norton Cyber Security Insights Report

    Sponsored by: ComputerWeekly.com

    This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime

  • Top 5 Benefits of a Security Operations Center

    Sponsored by: IBM

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.

  • Evaluating the Expanding Cloud Access Security Broker Market

    Sponsored by: Blue Coat Systems

    In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • Targeted Cyber Attacks: Infecting the Victim

    Sponsored by: UnitedLex

    This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.

  • Organizations Struggle through a Tough Year for SSL Protocols

    Sponsored by: Symantec Website Security

    In this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.