ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Combating APT in a New Way

    Sponsored by: Exabeam

    Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to Advanced Persistent Threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.

  • Putting Military Strategy to Work Against Malicious Activity

    Sponsored by: AlienVault

    Discover how your enterprise can put the OODA Loop philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breeches. Lean to observe a crisis from all angles, review events in the context of other activity on network to establish a timeline, quickly implement remediation on affected assets, and more.

  • Cool Vendors in Cloud Security Services

    Sponsored by: OpenDNS

    In this resource discover key findings of cloud security, in-depth analysis into cloud security providers, and unbiased recommendations to CISOs who are evaluating technology trends and planning future needs.

  • A Technology Brief on SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    In this resource get a detailed breakdown of SSL/TSL traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Read on to discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.

  • The Cloud: Securing Your Enterprise both Before and After Migration

    Sponsored by: Armor

    In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.

  • Eliminating Constraints to SSL Implementation

    Sponsored by: Blue Coat Systems

    In this resource you'll find a comprehensive and quick to digest info cache on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Inside you'll also find ways to increase its performance, scalability, and root out malicious activity using it as a cover.

  • City of Los Angeles Integrates Real-Time Security Intelligence Sharing

    Sponsored by: Splunk

    Access now to learn the challenges the city of Los Angeles faced and how they were ultimately resolved.

  • Implementing Data Privacy Requirements For Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to give visibility to encrypted traffic, reducing the risk of malicious activity to go unnoticed. Also find out how to achieve simple, effective policy enforcement.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.

  • Technology Platforms for Business Integration

    Sponsored by: Infor

    Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.

  • The Art and Science of Value Realization in the Cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • AWS Cautionary Tales and How to Avoid Becoming One

    Sponsored by: Palerra Inc.

    AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.

  • Mobile Threat Prevention Behavioral Risk Analysis

    Sponsored by: Check Point Software Technologies Ltd.

    Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.

  • How to get the best protection from your CASB

    Sponsored by: Palerra Inc.

    Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.

  • Demystifying Mobile Security Attacks

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.

  • Mobility In Financial Services: A Regulatory Compliance Checklist

    Sponsored by: BlackBerry

    Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.