ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • Secure your Mobile Enterprise

    Sponsored by: Unisys

    How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.

  • Anatomy of a Hack Disrupted

    Sponsored by: LogRhythm, Inc.

    What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.

  • Top 10 Cybersecurity Challenges Facing Organizations

    Sponsored by: Dimension Data

    Learn what the top 10 cybersecurity challenges that are facing enterprises today, how they are being handled (hint: poorly), and how you can identify and rectify your own shortcomings. Discover how secure your organization is in regards to, USB encryption, third party connectivity, data loss prevention, and more.

  • Mission-Critical Mobile Security: A Stronger, Sensible Approach

    Sponsored by: Unisys

    This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Blue Coat Systems

    This step-by-step guide takes you through the 11 things that an enterprise needs to do in order to de-risk apps and employees and maximize their use of adopting cloud applications and services. Learn not only the benefits, but the pitfalls and dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.

  • Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots

    Sponsored by: Distil Networks

    Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.

  • Unisys' Tom Patterson: 3 Key Steps in Securing Critical Infrastructure

    Sponsored by: Unisys

    In this video, Tom Patterson, VP and GM of Unysis Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.

  • Enterprise Security: What Erodes Confidence

    Sponsored by: Unisys

    True security experts know that it's time to lay simplistic perimeter defenses to rest -- before they continue to drain your resources. Explore this interview with Unisys' Chris Kloes as he offers insights from a recent security study.

  • Interview: One Trust Leader reveals how Security breeds Innovation

    Sponsored by: Unisys

    The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.

  • Combat Escalating Threats to Your Data Center

    Sponsored by: Juniper Networks, Inc.

    This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.

  • Security Solution Trends 2016

    Sponsored by: Juniper Networks, Inc.

    In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

  • DDoS Attack: Smoke Screen or Smoke Signal?

    Sponsored by: Arbor Networks

    Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.

  • Don't Let The Cloud Cast A Shadow On Security

    Sponsored by: Cisco Systems, Inc.

    Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.

  • Distributed Denial-of-Service Prevention Test Report

    Sponsored by: Arbor Networks

    In this in-depth report from NSS Labs, discover how a DDoS prevention device is put through a rigorous test to evaluate its effectiveness under a simulated DDoS attack. Learn how they can perform, what can go wrong, and view results on a detailed product scorecard.

  • Insider Threat Spotlight Report

    Sponsored by: Palerra Inc.

    In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.

  • Build a Cohesive, Effective Security Strategy

    Sponsored by: Splunk

    Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

  • How Bergen County Sheriff's Office Upgraded Their Video Surveillance

    Sponsored by: Pivot3

    Discover how the Bergen County Sheriff's office brought their video surveillance up-to-date with their growing needs. Learn how they reduced the number of active servers, cut energy costs, and retained high-availability access to records all while increasing their performance and storage from 1 petabyte (PB) to 2.5 PB.

  • The 2016 Global Cloud Data Security Study

    Sponsored by: Gemalto

    When done right, securing the cloud can have a domino effect on improved access management, encryption, efficiency, and competitive advantage. Learn more about what 3,476 IT pros worldwide are saying about cloud governance and security practices.

  • BYOD: Keeping the Benefits While Staying Secure

    Sponsored by: IBM

    In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

  • Technology Platforms for Business Integration

    Sponsored by: Infor

    Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.

  • Going global: Get up and running quickly no matter where you need to go

    Sponsored by: Infor

    Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Sponsored by: AlienVault

    Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.