ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Layered Security Strategies for a Mobile-First World

    Sponsored by: Microsoft

    This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.

  • Benefits of UTM Products and Evaluating Next-Gen Firewall Vendors

    Sponsored by: WatchGuard Technologies, Inc.

    This expert e-guide explains how UTMs work and benefit your network security strategy by closing vulnerability gaps. Continue reading and discover how to reduce security incidents and the top questions to evaluate next-gen firewalls to bolster security.

  • 10 Reasons You Need Endpoint Security

    Sponsored by: TechData Corporation

    In this white paper, you will discover 10 reasons why upgrading your security platform will save you time and effort managing your convoluted endpoint controls.

  • Infographic: Safely Adopt Cloud Services Without Sacrificing Security

    Sponsored by: F5 Networks

    In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.

  • Key Considerations in choosing a WAF

    Sponsored by: F5 Networks

    Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • Client Study: Security Intelligence

    Sponsored by: IBM

    This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • Using Identity to Create Next Generation, Risk-based Access Management

    Sponsored by: SecureAuth

    In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.

  • Evaluating Standout Services in the Cloud Identity and Access Management Sector

    Sponsored by: SecureAuth

    If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.

  • MSSP Success Checklist

    Sponsored by: AlienVault

    This white paper acts as a checklist for MSSP implementation in your organization. Review the template and find out how to centralize management and get organized.

  • Beginner's Guide to Open Source Intrusion Detection Tools

    Sponsored by: AlienVault

    This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.

  • SANS Critical Security Controls - Accelerated & Simplified

    Sponsored by: AlienVault

    The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Combating the Next Generation of Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

  • Unlocking the Promise of UTM-Enabled Network Protection

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper compares the efficacy of network security tools vs. unified threat management. Read more about the roadblocks to UTM adoption and if it's necessary for your organization in order to block malicious network threats.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Keep Data Safe, No Matter Who Tries to Look at It

    Sponsored by: OptioLabs

    This video explores the challenge of keeping prying eyes away from your sensitive data. Take a look and learn how face-recognition software can keep your data safe anywhere your end users work.

  • How Face-Recognition Software Can Secure Sensitive Data

    Sponsored by: OptioLabs

    Access this brief video to discover how face recognition software can help you ensure that only the end users you trust can view your sensitive data, regardless of who else is in the room.

  • Real-World Data Breach Protection Techniques

    Sponsored by: Intel

    This white paper examines the importance of data loss prevention (DLP) in today's advanced cybercrime environment. Read on to learn how you can implement effective DLP and keep your data out of hackers' hands.

  • Detect Network Anomalies with the Right Netflow Analysis Tool

    Sponsored by: Lancope

    In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.

  • Smarter Cybersecurity Solutions

    Sponsored by: Webroot

    This white paper highlights a cloud-based, cybersecurity solution that enables you to provide your customers with one, simple solution. Learn how to provide your customers with security that will simplify deployment and management, as well as save time and money.

  • Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control

    Sponsored by: IBM

    This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.

  • Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask

    Sponsored by: ThreatConnect

    This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.