ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Salvation Army Protects the Integrity of Data and Global Brand

    Sponsored by: Lumension

    Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.

  • How to Achieve Device Control Peace of Mind

    Sponsored by: Lumension

    Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.

  • PassMark Report: Enterprise Endpoint Security Performance Benchmarks

    Sponsored by: Symantec Corporation

    This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.

  • Handbook: Identity and Access Management

    Sponsored by: TechTarget Security

    In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • IBM: An Early Leader across the Big Data Security Analytics

    Sponsored by: IBM

    Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Identity and Access Management Buyer's Guide

    Sponsored by: IBM

    This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    Sponsored by: TechTarget Security

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Panda Cloud Systems Management: Reports Datasheet

    Sponsored by: Panda Security

    This crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.

  • Best Practices for Improving Mobile Data Security

    Sponsored by: TechTarget Security

    This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.

  • Panda Cloud Systems Management: Management Datasheet

    Sponsored by: Panda Security

    Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.

  • Panda Security and Delta Wines - Case Study

    Sponsored by: Panda Security

    Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Panda Security and Minopex - Case Study

    Sponsored by: Panda Security

    Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.

  • Rethink Defense-In-Depth Security Model For BYOD

    Sponsored by: TechTarget Security

    This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.

  • Shift Your Thinking on Endpoint Protection

    Sponsored by: CenterBeam

    In this e-guide, SearchSecurity.com experts explain the state of endpoint security and why it's time to change our endpoint protection approach. View now to learn more.

  • A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM

    Sponsored by: TechTarget Security

    In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.

  • Malware Attacks Demand a New Malware Defense Approach

    Sponsored by: TechTarget Security

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

  • Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company

    Sponsored by: OpenText Security Solutions

    This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.

  • Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    Sponsored by: OpenText Security Solutions

    This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.

  • Five Security Considerations for the Mobile Age

    Sponsored by: IBM

    While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.

  • Case Study - System One

    Sponsored by: OpenText Security Solutions

    This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.