ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • Cloud Security: Advanced, Efficient, and Trusted

    Sponsored by: Unisys

    Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.

  • How One Security Expert is Exploring Modern Threats to Enterprises

    Sponsored by: Check Point Software Technologies Ltd.

    Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.

  • Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud

    Sponsored by: Unisys

    Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Enhancing ATA Remediation: Monitor Continuously, Respond Swiftly

    Sponsored by: Intel Security

    Discover why endpoint detection and response (EDR) should be an indispensable supplement to your current defenses. Learn how to transform your team from an incident response mentality to one of continuous monitoring and equip yourself against zero-day and advanced targeted attacks.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Enhancing Security and System Functionality with the Cloud

    Sponsored by: Splunk

    This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering operational costs and reducing time resolution for errors.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • Secure Voting

    Sponsored by: ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Get Real-Time Threat Detection

    Sponsored by: AlienVault

    A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • Next Generation Firewall Test Report

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.

  • Test Report: Breach Detection System

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn the results of an independent test of the Check Point 13500 Next Generation Threat Prevention Appliance with Threat Emulation Cloud Service R77.20.

  • Zero-Day Attacks: Why you need a Deeper Level of Inspection

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • CPU-level Sandboxing: Disrupt Threats, not Productivity

    Sponsored by: Check Point Software Technologies Ltd.

    In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.

  • Make Security Part of Your Client Systems Refresh

    Sponsored by: Dell, Inc. and Intel®

    To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.

  • Study Shows New Generation of IT Security Threats

    Sponsored by: Dell, Inc. and Intel®

    This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.