ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Five Ways to Protect Your Digital Assets

    Sponsored by: Hewlett-Packard Enterprise

    Discover the not only a rundown of the threats that you need to prepare for if disaster strikes, but also the backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.

  • Cyber Security: How to Know What You Don't Know

    Sponsored by: Presidio Networked Solutions

    Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.

  • 2017 Will be an Exciting Year for IT

    Sponsored by: Splunk

    See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to learn how cloud success depends on the village, the lines between digital and physical will continue to blur due to IoT, 2017 will be a big year for analytics, and more.

  • LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform

    Sponsored by: Splunk

    This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • Managing Risks and Mitigating Threats in Today's IT Environment

    Sponsored by: TechData - HPE

    In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • How SAP Ensured Secure Application Production

    Sponsored by: TechData - HPE

    In this case study, learn the security strategy SAP used to find vulnerabilities in application code written in Java, C#, JSPs, and other languages. Find out how this helped them reduce cost to repair by fixing vulnerabilities early on, produce more secure code, and more.

  • Application Security Beyond SAST and DAST

    Sponsored by: Veracode, Inc.

    Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer.

  • 5 Lessons from an Application Security Pro

    Sponsored by: Veracode, Inc.

    Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.

  • Unified Insights on One Unified Threat Management Market Product

    Sponsored by: WatchGuard Technologies, Inc.

    This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • App Security Can’t Happen Without Developers

    Sponsored by: Veracode, Inc.

    In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.

  • Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases

    Sponsored by: Logentries

    Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.

  • How to Keep Your Organization Safe from Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.

  • Email-borne Malware Highlights Danger of Over-reliance on Sandboxes

    Sponsored by: Mimecast North America

    Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast North America

    Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.

  • Navigating Market Complexity to Fulfill Network Security Requirements

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.

  • Improve Network Security Speed and Performance

    Sponsored by: WatchGuard Technologies, Inc.

    In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.

  • What are the Real Costs of the DIY ELK Stack?

    Sponsored by: Logentries

    Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more.

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • School District Ensures Data Protection with Network Security Appliance

    Sponsored by: WatchGuard Technologies, Inc.

    One school district, with over 1,200 students and 400 staff members, needed to protect confidential data, remain compliant with CIPA (Children's Internet Protection Act) and improve visibility and control over web applications. In this case study, learn how the school was able to meet their needs with one advanced, network security appliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.