ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Citrix

    This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.

  • 10 Questions to Ask Your Vendor about File Gateway Consolidation

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • Accelerate Your Digital Business Through Cybersecurity

    Sponsored by: Dimension Data

    Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Complete Analysis of the Top SIEM Vendors

    Sponsored by: AlienVault

    The Magic Quadrant summarizes Gartner's yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • Secure Voting

    Sponsored by: ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Get Real-Time Threat Detection

    Sponsored by: AlienVault

    A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • Next Generation Firewall Test Report

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.

  • Test Report: Breach Detection System

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.

  • Research: Network is critial for IP Video Surveillance

    Sponsored by: Avaya

    Many organizations that historically focused on securing the IT infrastructure have shifted their focus to physical security. Access this research to learn about the near future of IP video surveillance.

  • How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations

    Sponsored by: Dell SecureWorks

    This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.

  • Zero-Day Attacks: Why you need a Deeper Level of Inspection

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • CPU-level Sandboxing: Disrupt Threats, not Productivity

    Sponsored by: Check Point Software Technologies Ltd.

    In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.

  • Make Security Part of Your Client Systems Refresh

    Sponsored by: Dell, Inc. and Intel®

    To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.

  • Study Shows New Generation of IT Security Threats

    Sponsored by: Dell, Inc. and Intel®

    This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Into the Breach: Tightening Security in Today’s Healthcare Organization

    Sponsored by: Aventura

    Download this infographic to uncover the key security issues, and the challenges of securing healthcare information today. Learn how you can boost healthcare IT system security with key recommendations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.