ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • ITAD to Strengthen Data Protection

    Sponsored by: Iron Mountain

    IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.

  • Gov't Agencies: Remain Secure and Compliant with 5 Considerations

    Sponsored by: TechData - Brother

    Discover 5 considerations when looking to remain secure and compliant in today's threat environment.

  • THE C-SUITE, THE BOARD AND CYBER-DEFENCE

    Sponsored by: Oracle Corporation

    Analyze this report filled with research from the Economist showing the 8 steps the C-Suite can take to succeed in reducing breaches across all major forms of cyberattack.

  • DevSecOps: How to Seamlessly Integrate Security Into DevOps

    Sponsored by: Sonatype

    In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.

  • Perimeter Security: An Identity Crisis

    Sponsored by: F5 Networks

    Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.

  • BitLocker Toolkit

    Sponsored by: WinMagic

    Access this white paper to discover how your enterprise can optimize its use of BitLocker to improve its encryption and identity security.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • Identity Management: The Key to Stopping Breaches

    Sponsored by: SailPoint Technologies

    With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.

  • Report: Tracking Global Internet Encryption Trends

    Sponsored by: F5 Networks

    Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.

  • Achieving Optimal IFRS 9 Compliance

    Sponsored by: SAS

    Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.

  • How to Secure Your Digital Experience

    Sponsored by: Oracle Corporation

    Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape

  • IAM: Your Tool to Defeating Data Breaches

    Sponsored by: SailPoint Technologies

    A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.

  • Security Report: Transaction Monitoring Optimization

    Sponsored by: SAS

    Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.

  • SAS Solution for Personal Data ProtectionEnabling compliance with new regulation

    Sponsored by: SAS

    Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.

  • SailPoint-Get-Ready-for-GDPR

    Sponsored by: SailPoint Technologies

    Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.

  • Secure and Govern Workloads and Infrastructure with Policy

    Sponsored by: Apcera

    Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.

  • The Role of Policy in Governing and Securing the Cloud

    Sponsored by: Apcera

    Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches. Additionally uncover 4 key areas where you need a security policy, a 3-part methodology to modern policy, and more.

  • Cyber Threats: A perfect storm about to hit Europe?

    Sponsored by: ComputerWeekly.com

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

  • Do You Know Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.

  • Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program

    Sponsored by: Hewlett Packard Enterprise

    Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.

  • The Ultimate Guide to the CCSP

    Sponsored by: ISC2

    Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.

  • Employee Monitoring: An Important Security Measure?

    Sponsored by: Veriato, Inc.

    Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this.

  • Is the Future of Enterprise Security In Managed Services?

    Sponsored by: F5 Networks

    Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.

  • Keeping Up with the Evolution of Security Operations Centers

    Sponsored by: McAfee, Inc.

    Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.

  • 77% of Hacked Passwords Comply with Current Standards

    Sponsored by: Specops Software

    Discover a method of granulated password policy application that provides protection and support not available under the default Window's password policy. Also uncover a link to a password strength auditor and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.