ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts this SIEM software to work as part of their security posture. Go inside to learn how, by implementing this program, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • TOP 10 Considerations for Bot Management

    Sponsored by: Akamai Technologies

    There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Bots to the Future – Why Bot Management Solutions are Necessary to Stop Hackers

    Sponsored by: Akamai Technologies

    This Frost and Sullivan review seeks to explore the challenges presented by bots, emerging solutions for bot management, and the potential market for these systems.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.

  • Combining Data Loss Protection with Cloud Access Security Broker Technology

    Sponsored by: Symantec

    Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • Security Investigations: The Importance of Detection and Rapid Response

    Sponsored by: Splunk

    Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.

  • Detecting Unknown Malware and Ransomware

    Sponsored by: Splunk

    Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • The Evolution from Two-Factor Authentication to Identity Assurance

    Sponsored by: RSA

    Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.

  • Secure Your Endpoint Devices With A Unified Endpoint Management Tool: IBM MaaS360 with Watson Overview

    Sponsored by: IBM

    Today's end-user devices are comprised of all form factors— everything from smartphones and tablets to laptops and desktops. IT faces the challenge of monitoring, securing and managing all of these end-user devices successfully. Learn how IBM® MaaS360® with Watson™, a cognitive unified endpoint management (UEM) tool, can help overcome this hurdle.

  • Computer Weekly – 22 August 2017: How banking technology has changed since the crash

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed. We look at how the EU's new data protection laws will affect storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or can bring benefits for enterprise IT. Read the issue now.

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.

  • Remediation and Mitigation for Windows Active Directory Security

    Sponsored by: Quest

    Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.