ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Insider Threats to Financial Services

    Sponsored by: Recorded Future

    More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.

  • The New Face of Cloud-Based Access management

    Sponsored by: Gemalto

    Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Remedying the Email Security Gaps in Microsoft Office 365

    Sponsored by: Mimecast

    Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.

  • Automated, Real-time Risk Analysis and Remediation

    Sponsored by: FireMon

    Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.

  • What is a Non-malware Attack?

    Sponsored by: Carbon Black

    What is a non-malware attack? Uncover a clear definition, along with a quick example that helps to explain exactly what it can do and why it is so dangerous today.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Ransomware: Defending Against 5 Major Types

    Sponsored by: Commvault

    Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.

  • Internet Security Threat Report

    Sponsored by: Symantec

    In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.

  • How to Become a Superstar Security Leader

    Sponsored by: Google Cloud

    Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.

  • Effectively Balancing DevSecOps

    Sponsored by: Flux7

    As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences

    Sponsored by: NICE Systems, Inc

    Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.

  • PASSIVE Voice Biometrics in ACTIVE Channels

    Sponsored by: NICE Systems, Inc

    Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.

  • The Six Essential Capabilities of an Analytics Driven SIEM

    Sponsored by: Splunk

    Legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Access this resource to uncover the 6 essential capabilities of an analytics-driven SIEM and learn how to keep your network secure.

  • Compliance As Code - A Visual Guide

    Sponsored by: Flux7

    Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.

  • Secure Cellular Connectivity Empowers BlueNRGY's Global Reach

    Sponsored by: Aeris

    IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.

  • How to Mitigate IP Theft by Departing Employees

    Sponsored by: Veriato, Inc.

    The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.

  • Incident Response for Today's Top 3 Security Scenarios

    Sponsored by: Exabeam

    This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.

  • The Challenges of Legacy SIEM Platforms

    Sponsored by: Exabeam

    Explore 3 reasons why legacy SIEM tools no longer meet the needs of most organizations. Plus, uncover the benefits of a modern security intelligence [platform.

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • 80/20: The New and Not-So New World of OT and IoT Security

    Sponsored by: Atos

    This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.

  • IT Pro's Guide to Endpoint Protection

    Sponsored by: Barkly

    Uncover key information on stopping malware and securing your business in this guide to endpoint protection. Discover why endpoint protection is more critical than ever, endpoint attackers' favorite targets, and more.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.