ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Enhancing Security and System Functionality with the Cloud

    Sponsored by: Splunk

    This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering tens of thousands in operational costs and reducing time resolution for errors.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • Secure Voting

    Sponsored by: ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Get Real-Time Threat Detection

    Sponsored by: AlienVault

    A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • Next Generation Firewall Test Report

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.

  • Test Report: Breach Detection System

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.

  • Zero-Day Attacks: Why you need a Deeper Level of Inspection

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • CPU-level Sandboxing: Disrupt Threats, not Productivity

    Sponsored by: Check Point Software Technologies Ltd.

    In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.

  • Make Security Part of Your Client Systems Refresh

    Sponsored by: Dell, Inc. and Intel®

    To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.

  • Study Shows New Generation of IT Security Threats

    Sponsored by: Dell, Inc. and Intel®

    This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

  • Report: (In)Security Everywhere in 2016

    Sponsored by: ESET

    In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.

  • Security Architecture Review: Reducing Detection and Response Times

    Sponsored by: LogRhythm, Inc.

    This white paper showcases how to provide greater visibility across the ever-expanding attack surface and apply big data analytics to detect patterns of concerning behavior faster.

  • Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers

    Sponsored by: LogRhythm, Inc.

    One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.

  • Make Endpoint Security Part of Your Client Systems Refresh

    Sponsored by: Dell, Inc. and Intel®

    Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.

  • An Integrated Approach to Reducing Detection and Response Times

    Sponsored by: LogRhythm, Inc.

    Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.

  • Dispelling the Shadows Cast Over IT Security

    Sponsored by: OpenDNS

    This guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.

  • The Current and Future State of IT Security

    Sponsored by: Dell, Inc. and Intel®

    To know what needs improvement, decision-makers need only look to their peers. Learn the priorities, challenges and strengths in IT security from 1,440 interviews conducted by market research analysts Vanson Bourne.

  • The Evolution of Network Security Hardware

    Sponsored by: Aruba Networks

    This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.