ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    In this transcript join experts Brent Midwood and Kevin Beaver as they discuss best practices in approaching and addressing ransomware. Gain valuable insight into what drives ransomware developers (hint: the profits are enormous), the developing trends in ransomware deployment, and more.

  • How to Implement Practical Security Assessments

    Sponsored by: ModoModo

    This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.

  • Securely Bridge Traditional and Cloud Application Environments

    Sponsored by: A10 Networks

    Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.

  • Office of the CIO - Box Case Study

    Sponsored by: IBM

    Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.

  • An Essential Checklist for Your Security Response Solution

    Sponsored by: ServiceNow

    Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.

  • Respond to Threats Faster and More Effectively Than Ever

    Sponsored by: ServiceNow

    Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.

  • How to Secure Your Mainframes in Today's Threat Landscape

    Sponsored by: Thycotic

    Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.

  • HPE Enterprise Secure Key Manager Best Practices

    Sponsored by: Hewlett Packard Enterprise

    Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.

  • Securely Go Digital with Your Business Processes

    Sponsored by: Cisco

    Discover two use cases of small business owners and the path that led them to become "secure digitizers", enabling a first-move advantage in terms of digitization for a smaller organization. Learn how to secure roaming users, implement secure guest access, scale security along with the network, and more.

  • Navigate Your Way Around Ransomware

    Sponsored by: Barracuda Networks

    Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works, the most common variants that are active today, and 3 steps to recover from ransomware.

  • Cyber Security: How to Know What You Don't Know

    Sponsored by: Presidio Networked Solutions

    What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.

  • 5 Lessons from an Application Security Pro

    Sponsored by: Veracode, Inc.

    Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.

  • Unified Insights on One Unified Threat Management Market Product

    Sponsored by: WatchGuard Technologies, Inc.

    This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.

  • How to Seamlessly Integrate Security Into DevOps

    Sponsored by: Veracode, Inc.

    Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: SingTel

    Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.

  • Cybersecurity: Shift from a Position of Acknowledgement to Leadership

    Sponsored by: SingTel

    Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.

  • Survey Findings: Data Security

    Sponsored by: Dell India

    This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.

  • Five Tactics to Stop Email Attacks

    Sponsored by: Mimecast North America

    Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.

  • Enterprise Mobile Threat Research

    Sponsored by: Appthority

    97% of apps have ATS exceptions that actively weaken their security defaults. Discover how to keep your applications secure and compliant in the face of new regulations.

  • Mobile Security Checklist: Top Ten Threats to Your Enterprise Today

    Sponsored by: BlackBerry

    Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.

  • What Constitutes Effective Security Awareness Training?

    Sponsored by: KnowBe4

    Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.

  • Block Zero-Day Threats Before They Hit Endpoints

    Sponsored by: Intel Security

    Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.

  • 2016 BYOD and Mobile Security Spotlight Report

    Sponsored by: BitGlass

    With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • How to Tackle Endpoint Defense Issues

    Sponsored by: Carbon Black

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.