ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • The Future of DLP is Automation

    Sponsored by: Ghangor Cloud

    Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.

  • Your Guide to Kingslayer: The Anatomy of a Supply Chain Attack

    Sponsored by: RSA

    This postmortem report can help your organization prevent the next loss of business or mission critical information from a sophisticated exploitation campaign, diving in-depth into the Kingslayer attack.

  • 11 Security Analytics Providers Slug It Out

    Sponsored by: RSA

    Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.

  • Top Internet of Things Security Concerns

    Sponsored by: Peak10

    70% of IoT ready devices are vulnerable to hackers, and there doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.

  • See How a Major National Security Agency Protects its Sensitive Data

    Sponsored by: Ghangor Cloud

    Discover how a leading southeast Asian country's national security agency recently upgraded their data leak prevention mechanisms. Learn how they were able to safeguard sensitive national security information, financial transaction information and other confidential mission critical information.

  • How The Mirai Botnet is Fueling Today's Largest and Most Crippling DDoS Attacks

    Sponsored by: Akamai

    The largest DDoS attacks have increased greatly in strength and doubled in attack size in 2016. Access this whitepaper to uncover how to defend against DDoS attacks and stay ahead of the malicious threats like the Mirai botnet.

  • Choose the Path to Complete Mobile Security and Productivity

    Sponsored by: MobileIron

    Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.

  • Security: Making a Better Case for Technology in the Classroom

    Sponsored by: Absolute

    Explore how educators can ensure the security and efficacy of desktop and mobile devices used by students and staff in K–12 schools while reducing IT administration and management demands and remaining compliant.

  • 7 Critical Considerations for Choosing a Cloud Security Provider

    Sponsored by: Akamai

    Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud and uncover the 7 key factors to consider when evaluating a cloud provider.

  • Connectivity Options For Microsoft Office 365

    Sponsored by: Zscaler

    In September 2016, Microsoft introduced new guidance on best practices for enterprises looking to deploy Office 365. In these guidelines, learn how Office 365 was built to be accessed securely and reliably via a direct Internet connection.

  • Moving to the Cloud: The Buyer's Guide to Cloud Security

    Sponsored by: Akamai

    In this e-book, learn how you can augment your existing security processes with additional cloud measures for a more robust web security posture. You'll also learn why cloud-based security matters, how even average DDoS attacks can challenge weaker solutions, and more.

  • Mobile Security: The 6 Questions Modern Organizations are Asking

    Sponsored by: Lookout

    As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.

  • Mobile Risks: What's Keeping CISOs up at Night

    Sponsored by: Lookout

    With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.

  • MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering

    Sponsored by: MobileIron

    Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.

  • 2017 Threats Predictions

    Sponsored by: McAfee, Inc.

    Use this infographic to get the inside scoop on the 4 security threats that are poised to make an impact on the market in 2017.

  • The Missing Piece in the GDPR Puzzle

    Sponsored by: Collibra

    The clock is ticking. Regulators will issue significant fines for GDPR non-compliance next year. However, with such a massive regulation, where do you begin? Access this resource to uncover how to prepare your organization in the countdown and discover how data governance can help ensure you're GDPR compliant.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: Cisco Umbrella and Dimension Data

    In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • Your Guide to Trends in Mobile User Authentication

    Sponsored by: HID

    As mobile devices play a greater role in corporate computing and employees become more reliant on them, new security challenges emerge and existing ones become more complex. Access this white paper to discover how the risk of unauthorized access to mobile devices adds new requirements for user authentication.

  • Safeguard Data Across the Board Through Smarter Authorization Enablement

    Sponsored by: HID

    Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.

  • A Network Manager's Guide to Ransomware

    Sponsored by: Cisco Umbrella and Dimension Data

    Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.

  • Mobile Identity Authentication: Today's Take on Trusted Identity

    Sponsored by: HID

    Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.

  • Secure Identity Experience in the Age of Connected Everything

    Sponsored by: HID

    Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: tCell

    Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.