ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • BYOD and Mobile Security Report

    Sponsored by: BitGlass

    Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • Market Analysis for 18 Featured Endpoint Protection Platforms

    Sponsored by: Trend Micro

    Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.

  • Endpoint Security Suites: How 15 Providers Stack Up

    Sponsored by: Trend Micro

    In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.

  • Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies

    Sponsored by: Trend Micro

    IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.

  • Threat Intelligence Platforms: A Research Report

    Sponsored by: AlienVault

    Find how a social media-esque, community-focused approach to threat intelligence has proven to be effective at identifying and analyzing emerging threats.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: Intel Security

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Web App Firewall Evaluations: Get the Results and Hear Customer Insights

    Sponsored by: Imperva

    This 2016 analysis for web application firewall (WAF) tools reviews 16 vendors and is based on detailed responses to questionnaires from experienced WAF customers. Uncover the experiences of participants in this research, and how they implemented WAF technologies to protect their applications and critical data.

  • How SAIC Empowers Its Security Operations Center with Splunk

    Sponsored by: Splunk

    In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.

  • 2016 Security Report: Staying One Step Ahead

    Sponsored by: Check Point Software Technologies Ltd.

    This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.

  • Case Study: Expedient Keeps Customers' Networks Safe and Highly Available

    Sponsored by: Juniper Networks, Inc.

    Learn how an IT outsourcing company was able to offer its clients services tailored to their specific needs and accelerate service delivery across the spectrum.

  • Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape

    Sponsored by: ThreatStack

    Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.

  • 2016 Mobile Security & Business Transformation Study

    Sponsored by: IBM

    Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.

  • SECURE WEB GATEWAY TEST REPORT

    Sponsored by: Trustwave

    NSS Labs performed an independent test of the Trustwave Secure Web Gateway SWG TS500 v11.6.0.28. This report describes the test results and will help you determine if this secure web gateway tool is right for you.

  • Building Natural Active Immunity against Advanced Threats

    Sponsored by: Fortinet, Inc.

    Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.

  • The Virtual Firewall Buyer's Guide

    Sponsored by: Juniper Networks, Inc.

    Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.

  • How One SIEM Strategy Stacks Up

    Sponsored by: LogRhythm, Inc.

    This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.

  • Combating financial crime: The increasing importance of financial crimes intelligence units in banking

    Sponsored by: SAS

    This white paper assesses how aware banks in Europe and North America are of FCIUs and what measures they have been taking to be more prepared for full implementation of their own FCIU. Understand the importance of banks' FCIUs and potential central intelligence services will offer to the banking industry and to crime prevention.

  • SIEM Software Gives Companies Insight into Both Security and Business Operations

    Sponsored by: LogRhythm, Inc.

    SIEM software has come a long way in the past decade, and continues to prove its worth by evolving to rise up against cybercrime. Access this resource to learn more about the increasing effectiveness of SIEM tools.

  • Incident Response Capabilities in 2016

    Sponsored by: LogRhythm, Inc.

    As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.

  • Anatomy of a Hack Disrupted

    Sponsored by: LogRhythm, Inc.

    What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Blue Coat Systems

    This easy-to-follow guide takes you through the 11 steps that enterprises can take in order to learn, not only the benefits, but how to mitigate the dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.

  • Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots

    Sponsored by: Distil Networks

    Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.

  • 2016 Security Trends and Predictions

    Sponsored by: Juniper Networks, Inc.

    In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.