ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • Compliance Challenges & Security Effectiveness in the Workplace

    Sponsored by: Citrix

    Organizations admit challenges in reducing the risk from unapproved apps and devices. Read this white paper to discover global trends in IT security risks.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.

  • Email Security Risk Assessment

    Sponsored by: Mimecast

    Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.

  • Remediation and Mitigation for Windows Active Directory Security

    Sponsored by: Quest

    Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.

  • Protecting the Hybrid Cloud from Advanced Threats

    Sponsored by: TrendMicro

    With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.

  • Endpoint Security Review: Cb Defense

    Sponsored by: Carbon Black

    Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • How to Mitigate IP Theft by Departing Employees

    Sponsored by: Veriato, Inc.

    The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Sponsored by: Cisco Umbrella

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Securing DNS: What to Do, and What to be Aware of

    Sponsored by: Cisco Umbrella

    In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.

  • SiliconANGLE Spotlight: HyTrust

    Sponsored by: HyTrust

    Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.

  • Sleeping with the Enemy: Achieving Agility and Security with DevSecOps

    Sponsored by: WhiteHat Security

    To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.

  • Product Overview: 30 Minutes to a More Secure Enterprise

    Sponsored by: Cisco Umbrella

    DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.

  • Guide To PCI Compliance For Containers

    Sponsored by: Twistlock, Inc.

    Inside this guide learn tips for both technical and compliance teams on managing containers for credit card information. Most importantly, discover how this program can help maintain compliance for the Payment Card Industry (PCI) and Data Security Standard (DSS).

  • The Rise Of The Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.

  • Beyond your company boundaries

    Sponsored by: ComputerWeekly.com

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • A Ranking of Today's Endpoint Protection Platforms

    Sponsored by: Sentinel Labs, Inc.

    Open this Gartner Magic Quadrant report to get a clear comparison of how 22 endpoint protection platform providers stack up, as well as the strengths of each individual offering, and some cautions to be aware of so that you can be fully informed when making your purchasing decision.

  • Leveraging Multi-factor Authentication to Power Protection

    Sponsored by: Centrify Corporation

    According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.

  • How to Detect & Respond to a Petya Ransomware Attack

    Sponsored by: AlienVault

    On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • 5 Myths about Privileged Access Security for AWS

    Sponsored by: Centrify Corporation

    This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.