ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.

  • Email Security Threats: Not Just from the Outside

    Sponsored by: Mimecast

    Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.

  • The Mimecast Email Security Risk Assessment 2017

    Sponsored by: Mimecast

    By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    In this transcript join experts Brent Midwood and Kevin Beaver as they discuss best practices in approaching and addressing ransomware. Gain valuable insight into what drives ransomware developers (hint: the profits are enormous), the developing trends in ransomware deployment, and more.

  • Today's State of Endpoint Protection & Management

    Sponsored by: Absolute

    Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.

  • 6 Discoveries IT Security Pros Need to Know about SSL Inspection

    Sponsored by: A10 Networks

    Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.

  • How to Implement Practical Security Assessments

    Sponsored by: ModoModo

    This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.

  • IAM on the Cloud: Avoiding Silos and Vulnerability

    Sponsored by: Centrify in partnership with Microsoft

    Access this e-guide now to discover how to use Identity as a Service (IDaaS) to meet both operational and security objectives.

  • Financial Technologies Protects its Network From Malware and Other Internet Threats

    Sponsored by: ContentKeeper

    Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.

  • Box: Securing Business Information In The Cloud

    Sponsored by: IBM

    Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.

  • Office of the CIO - Box Case Study

    Sponsored by: IBM

    Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.

  • Vendor Analysis: 8 Cloud Security Gateway Providers

    Sponsored by: Blue Coat Systems

    In this Forrester report, discover a 23-criteria evaluation for cloud security gateway (CSG) providers that identifies, analyzes, and scores the top 8, allowing you to make an educated decision in choosing which one might be the best for your enterprise.

  • 7 Data Loss Prevention Suite Providers Compared

    Sponsored by: Blue Coat Systems

    In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.

  • How to Get More Signal, Less Noise for Your SIEM

    Sponsored by: ExtraHop

    Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.

  • Confronting Enterprise Security Risk: The State of Incident Response

    Sponsored by: ServiceNow

    In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.

  • An Essential Checklist for Your Security Response Solution

    Sponsored by: ServiceNow

    Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.

  • Respond to Threats Faster and More Effectively Than Ever

    Sponsored by: ServiceNow

    Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.

  • Status Quo Creates Security Risk

    Sponsored by: ServiceNow

    Discover what 184 IT pros think are the most important factors that lead to incident response excellence, such as security and IT tool integration, the ability to know whether a security incident impacts a critical system and strong collaboration between the incident response and IT operations teams.

  • Bringing IT and Security Together for Better Security Response

    Sponsored by: ServiceNow

    Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.

  • How to Secure Your Mainframes in Today's Threat Landscape

    Sponsored by: Thycotic

    Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.

  • Encryption Key Management Best Practices

    Sponsored by: Hewlett Packard Enterprise

    Learn how enterprise encryption key management is fundamentally changing alongside data centers and applications, as well as how to prepare your organization for this revolution in design, function, and efficiency.

  • How GDPR Compliance Can Drive Business Growth and Increase Value

    Sponsored by: Hewlett-Packard Enterprise

    Learn how to mitigate risk and derive business value as you take on the EU GDPR. Gain access to a comprehensive guide to GDPR, multiple GDPR-related videos, and a breakdown of how to achieve GDPR compliance.

  • Risk Management: Best and Worst Practices

    Sponsored by: BitSight

    Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.

  • Detect Ransomware Before its's Too Late

    Sponsored by: AlienVault

    View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.

  • How to Tackle Endpoint Defense Issues

    Sponsored by: Carbon Black

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.