ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • The Tug of War Between UBA and SIEM

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • The Australian Privacy Amendment Explored

    Sponsored by: Rapid7

    Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.

  • Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive

    Sponsored by: Juniper Networks, Inc.

    In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way.

  • Next-Generation Firewalls: The Cornerstone of Future Security

    Sponsored by: Palo Alto Networks

    Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.

  • Protecting the Financial Services Organization

    Sponsored by: Juniper Networks, Inc.

    Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.

  • Discover an Advanced Cloud-Based Threat Prevention Suite

    Sponsored by: Juniper Networks, Inc.

    Inside this tech overview, learn about Sky Advanced Threat Prevention, a cloud-based service with features built to adapt to the ever-changing threat landscape and fend off today's ransomware and DDoS attacks.

  • Learn How You can Simplify Mobile Security

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytical Stories: How I Learned to Stop Worrying and Respond to Threats

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • TOP 10 Considerations for Bot Management

    Sponsored by: Akamai Technologies

    There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Bots to the Future – Why Bot Management Solutions are Necessary to Stop Hackers

    Sponsored by: Akamai Technologies

    This Frost and Sullivan review seeks to explore the challenges presented by bots, emerging solutions for bot management, and the potential market for these systems.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.

  • Combining Data Loss Protection with Cloud Access Security Broker Technology

    Sponsored by: Symantec

    Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Security Investigations: The Importance of Detection and Rapid Response

    Sponsored by: Splunk

    Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.

  • Detecting Unknown Malware and Ransomware

    Sponsored by: Splunk

    Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.

  • Case Study: How Six Flags Overcame the Challenges of Insufficient Bandwidth

    Sponsored by: Akamai Technologies

    In this case study, find out how Six Flags used a Content Delivery Network (CDN) to overcome the challenges of a wide area network to increase app downloads and customer satisfaction.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive

    Sponsored by: Oracle Corporation

    In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.