ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • The Changing Workforce: Automation & the Role of Ex-Hackers

    Sponsored by: Radware

    The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.

  • Building Natural Active Immunity against Advanced Threats

    Sponsored by: Fortinet, Inc.

    Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.

  • The Virtual Firewall Buyer's Guide

    Sponsored by: Juniper Networks, Inc.

    Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.

  • How One SIEM Strategy Stacks Up

    Sponsored by: LogRhythm, Inc.

    This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.

  • Biometrics and Bots – The Future of Technology in Financial Services

    Sponsored by: Unisys

    The journey into future technology for financial services constantly evolves and moves, with new products and ideas redefining it all the time. Uncover predictions from seasoned financial services insider Adam Oldfield, who examines security in banking through 2026.

  • Combating financial crime: The increasing importance of financial crimes intelligence units in banking

    Sponsored by: SAS

    This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU. Understand the importance of banks' FCIUs and potential central intelligence services will offer to the banking industry and to crime prevention.

  • SIEM Software Gives Companies Insight into Both Security and Business Operations

    Sponsored by: LogRhythm, Inc.

    SIEM software has come a long way in the past decade, and continues to prove its worth by evolving to rise up against cybercrime. Access this resource to learn more about the increasing effectiveness of SIEM tools.

  • Incident Response Capabilities in 2016

    Sponsored by: LogRhythm, Inc.

    As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.

  • Secure your Mobile Enterprise

    Sponsored by: Unisys

    How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.

  • Anatomy of a Hack Disrupted

    Sponsored by: LogRhythm, Inc.

    What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.

  • Mission-Critical Mobile Security: A Stronger, Sensible Approach

    Sponsored by: Unisys

    This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Blue Coat Systems

    This step-by-step guide takes you through the 11 things that an enterprise needs to do in order to de-risk apps and employees and maximize their use of adopting cloud applications and services. Learn not only the benefits, but the pitfalls and dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.

  • Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots

    Sponsored by: Distil Networks

    Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.

  • 3 Key Steps to Securing Critical Infrastructure

    Sponsored by: Unisys

    In this video, Tom Patterson, VP and GM of Unisys Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.

  • Enterprise Security: What Erodes Confidence

    Sponsored by: Unisys

    True security experts know that it's time to lay simplistic perimeter defenses to rest – before they continue to drain your resources. Explore this interview with Unisys' Chris Kloes as he offers insights from a recent security study.

  • Interview: One Trust Leader reveals how Security breeds Innovation

    Sponsored by: Unisys

    The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.

  • Combat Escalating Threats to Your Data Center

    Sponsored by: Juniper Networks, Inc.

    This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.

  • Security Solution Trends 2016

    Sponsored by: Juniper Networks, Inc.

    In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

  • DDoS Attack: Smoke Screen or Smoke Signal?

    Sponsored by: Arbor Networks

    Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.

  • Don't Let The Cloud Cast A Shadow On Security

    Sponsored by: Cisco Systems, Inc.

    Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.

  • Distributed Denial-of-Service Prevention Test Report

    Sponsored by: Arbor Networks

    In this in-depth report from NSS Labs, discover how a DDoS prevention device is put through a rigorous test to evaluate its effectiveness under a simulated DDoS attack. Learn how they can perform, what can go wrong, and view results on a detailed product scorecard.

  • Insider Threat Spotlight Report

    Sponsored by: Palerra Inc.

    In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.

  • Build a Cohesive, Effective Security Strategy

    Sponsored by: Splunk

    Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

  • How Bergen County Sheriff's Office Upgraded Their Video Surveillance

    Sponsored by: Pivot3

    Discover how the Bergen County Sheriff's office brought their video surveillance up-to-date with their growing needs. Learn how they reduced the number of active servers, cut energy costs, and retained high-availability access to records all while increasing their performance and storage from 1 petabyte (PB) to 2.5 PB.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.