ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • The Importance of DDoS Mitigation

    Sponsored by: Arbor Networks

    In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.

  • DDoS Attack: Smoke Screen or Smoke Signal?

    Sponsored by: Arbor Networks

    Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.

  • Don't Let The Cloud Cast A Shadow On Security

    Sponsored by: Cisco Systems, Inc.

    Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.

  • Penetration Testing: Protect Customer Data and Your Business From a Breach

    Sponsored by: eTECH Channel

    Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.

  • The Bot Problem: Managing Bot Traffic in the Travel Industry

    Sponsored by: Akamai

    In this white paper discover how bots affect search visibility, aggregation, and on-site performance, and more. Learn what can be done to respond to these bots and achieve the goals for your site.

  • Distributed Denial-of-Service Prevention Test Report

    Sponsored by: Arbor Networks

    In this in-depth report from NSS Labs, discover how a DDoS prevention device is put through a rigorous test to evaluate its effectiveness under a simulated DDoS attack. Learn how they can perform, what can go wrong, and view results on a detailed product scorecard.

  • SunRice Reboots Their Cyberthreat Defense & ROBO Network Security

    Sponsored by: Palo Alto Networks

    In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.

  • An End-to-End Framework For Mobile Security

    Sponsored by: BlackBerry

    Discover how to secure corporate data on the cloud in a BYOD environment. Learn not only about the changing landscape of mobile security, but also the growing trends that make securing enterprise data on these devices more vital than ever.

  • Industry Assessment: Key Findings on Effective Threat Protection

    Sponsored by: Check Point Software Technologies Ltd.

    This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.

  • Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. You'll also explore the emerging role of sandboxing as a powerful weapon in cyber security.

  • How to Conquer the Biggest AWS Adoption Challenges

    Sponsored by: Palerra Inc.

    Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.

  • Use Secure Cloud and Scalability to Revolutionize B2B Payments Market

    Sponsored by: Armor

    Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.

  • Azure Security and Identity Management Best Practices

    Sponsored by: Rackspace

    Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.

  • Cloud Security Automation: Are We Up To The Task?

    Sponsored by: Palerra Inc.

    In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.

  • A Unified View for Proactive Security

    Sponsored by: Fortinet, Inc.

    Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.

  • Cloud Security Spotlight Report

    Sponsored by: Palerra Inc.

    This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.

  • Ransomware: Attack Trends, Prevention, and Response

    Sponsored by: Check Point Software Technologies Ltd.

    Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.

  • Overcome the Limitations of Traditional Cloud Security for Office 365

    Sponsored by: Palerra Inc.

    See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • Insider Threat Spotlight Report

    Sponsored by: Palerra Inc.

    In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.

  • Ransomware: What You Need to Know

    Sponsored by: Check Point Software Technologies Ltd.

    This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.

  • Spotlight on Insider Threats to Cloud Applications

    Sponsored by: Palerra Inc.

    In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.

  • Managing Information Security Amid New Threats: A Guide for CIOs

    Sponsored by: OpenDNS

    In this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.

  • Addressing the Security Dangers of "Appification"

    Sponsored by: IBM

    Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.