ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Trends in Mobile User Authentication

    Sponsored by: HID

    Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.

  • Important Modern Trends in Digital Banking

    Sponsored by: HID

    Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • BYOD and Mobile Security Report

    Sponsored by: BitGlass

    Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • How MDM Software Exposes Your Personal Data

    Sponsored by: BitGlass

    Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.

  • LogRhythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats.

  • Market Analysis for 18 Featured Endpoint Protection Platforms

    Sponsored by: Trend Micro

    Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.

  • Endpoint Security Suites: How 15 Providers Stack Up

    Sponsored by: Trend Micro

    In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.

  • Security Analytics: Searching for Meaning

    Sponsored by: SearchSecurity.com

    This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.

  • Beyond Next-Gen: Defining Future-ready Endpoint Security

    Sponsored by: Trend Micro

    ESG conducted market research to explore how organizations employ advanced endpoint security controls. Learn how the endpoint itself has changed, how its weaknesses are exploited to perpetuate attacks, and the techniques and controls that can mitigate them.

  • Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies

    Sponsored by: Trend Micro

    IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: Intel Security

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Neurosurgery Leader Improves Efficiency, Compliance And Security

    Sponsored by: RES Software

    Discover how Carolina Neurosurgery & Spine Associates (CNSA) adopted a digital workspace program that allowed them to not only improve their security, but also the effectiveness of their IT as a whole. Discover how they were able to increase clinician efficiency, reduce the risk of non-compliance, and improve cybersecurity.

  • The business of Ransomware: What every CXO should know

    Sponsored by: Code42

    Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.

  • Delivering a More Secure Web Performance

    Sponsored by: Akamai

    In this white paper learn about a flexible and customizable security program that was built with web security in mind. Find out how to gain actionable insights into security events, provide a better mobile web experience, optimize load balance across data centers, and more.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Case Study: Cobweb Reduces Network Security Configuration Time from Hours to Minutes

    Sponsored by: Forcepoint

    Find out how Cobweb, a cloud solution provider, can automatically update their data centers, increase their bandwidth, add connections, and aggregate across network links safely and securely, giving multiple seamless failover options.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Definitive Guide to Security Intelligence and Analytics

    Sponsored by: LogRhythm, Inc.

    Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.

  • The New Generation of Network Security

    Sponsored by: Juniper Networks, Inc.

    Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.

  • Agile Security for Virtualization, Software-DefinedNetworking, and Cloud

    Sponsored by: Fortinet, Inc.

    Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.

  • 2016 Security Report: Staying One Step Ahead

    Sponsored by: Check Point Software Technologies Ltd.

    This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.

  • Create a Customized Testing Strategy

    Sponsored by: IBM

    Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.