ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Financial markets regulatory outlook 2017

    Sponsored by: ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: Hewlett-Packard Enterprise

    Discover not only a rundown of the threats that you need to prepare for if disaster strikes, but also the data backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.

  • Reengineering The Internet for Stronger Network Security

    Sponsored by: Neustar

    Discover how to make the internet safer, faster, and more efficient by tackling today's threats and mitigating website downtime, keeping your team calm and efficient.

  • Cybersecurity as a Growth Advantage

    Sponsored by: Cisco

    Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.

  • Data Security for Small to Midsize Businesses

    Sponsored by: Hewlett-Packard Enterprise

    Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more.

  • Cyber Security: How to Know What You Don't Know

    Sponsored by: Presidio Networked Solutions

    What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security: A Developer's Viewpoint

    Sponsored by: Veracode, Inc.

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • Application Security Beyond SAST and DAST

    Sponsored by: Veracode, Inc.

    Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • App Security Can’t Happen Without Developers

    Sponsored by: Veracode, Inc.

    In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.

  • Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases

    Sponsored by: Logentries

    Explore 4 use cases that exemplify why real-time analytics using log data streams are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.

  • How to Keep Your Organization Safe from Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.

  • Wireless Security: Keeping Intrusion Prevention Systems Simple and Effective

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to avoid wrongful classification of devices on your network, keep your wireless secure, and eliminate false alarms and the effort of defining complex rules to identify rogue wireless devices and manually inspecting them.

  • Guest Wi-Fi: The Most Valuable Marketing Tool for Physical Businesses

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to keep your Wi-Fi secure, scalable, and feature-rich while gaining insight into its users, their patterns, and other marketing data. Read on to securely gain the capabilities of high-priced marketing without the price tag.

  • Email-borne Malware Highlights Danger of Over-reliance on Sandboxes

    Sponsored by: Mimecast North America

    Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast North America

    Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.

  • Email Security in a Zero Trust World

    Sponsored by: Mimecast North America

    Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.

  • Improve Network Security Speed and Performance

    Sponsored by: WatchGuard Technologies, Inc.

    In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.

  • The 5 Rings of Data Integration Hell Impacting Your Security

    Sponsored by: Globalscape

    In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • 7 Ways To Make Yourself Hard To Hack

    Sponsored by: Solarwinds MSP

    Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.