ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Threat Defense Isn't Just About Detection: It's How Your Respond

    Sponsored by: Intel Security

    EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.

  • Case Study: Global Security Management Made Easier for Leading IT Service Provider

    Sponsored by: Intel Security

    Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.

  • Enhancing ATA Remediation: Monitor Continuously, Respond Swiftly

    Sponsored by: Intel Security

    Endpoint detection and response should be an indispensable supplement to your current defenses. Explore ways to evolve from a reactive mentality to a proactive one of continuous monitoring, and block advanced targeted attacks before it's too late.

  • Leveraging Threat Intelligence In Incident Response

    Sponsored by: Intel Security

    The ultimate goal of any incident management process is to contain the damage of attacks. This requires you to investigate and find the root causes of attacks faster. How? Find out how to more effectively safeguard your network from attack, monitor for indicators of compromise, and streamline your response if an attack is (inevitably) successful.

  • Think Like an Attacker: Six Steps Toward Better Security

    Sponsored by: Intel Security

    Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.

  • Securosis: SIEM Kung Fu

    Sponsored by: Intel Security

    Learn how to make the most of your existing security information and event management (SIEM) product or service as we reveal real-world use cases as to why SIEM still matters (although no longer requires a ninja DBA to help with it) and how your current security monitoring platform can be leveraged to enable faster detection and prevention.

  • Understanding Cyberthreat Motivations to Improve Defense

    Sponsored by: Intel Security

    Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • How Healthcare Organizations Both Enable Mobile Users and Stay Compliant

    Sponsored by: BlackBerry

    Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.

  • Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential

    Sponsored by: LogicNow

    This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • 4 Steps to Developing a Proactive Security Program

    Sponsored by: Dell SecureWorks

    Switch gears to a proactive defense. In 4 simple steps learn the discrete layers and levels needed for a security strategy that doesn't just react after the fact.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Formulate a Game Plan for Closing the SecOps Gap

    Sponsored by: BMC

    Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Imperva

    You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".

  • Discovering Security Analytics Use Cases

    Sponsored by: Prelert

    In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.

  • 10 Questions to Ask Your File Gateway Consolidation Vendor

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • Top 5 Benefits of a Security Operations Center

    Sponsored by: IBM

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.