ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Securing & enabling the Mac-empowered enterprise

    Sponsored by: Code42

    This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Security Information and Event Management (SIEM) Orchestration

    Sponsored by: Intel Security

    This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.

  • SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Bringing IT and Security Together for Better Breach Response

    Sponsored by: ServiceNow

    Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your security team more efficient when reacting to an assortment of threats and vulnerabilities.

  • Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this comprehensive report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA, Intel Security, as they go over findings from this year's Data Breach Investigation Report.

  • A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Learn how the disconnect between security and IT tools can led to seemingly lackadaisical security responses to serious breaches. Uncover how lack of automation, organizational opacity, unsecured data sets, and numerous and disjointed tools all add to this supreme inefficiency.

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Your Blueprint to Securing Your Public and Hybrid Cloud

    Sponsored by: Fortinet, Inc.

    Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.

  • Defining Security for Today’s Cloud Environments

    Sponsored by: Fortinet, Inc.

    Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.

  • Policing cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Cloud Computing Security Considerations and Requirements

    Sponsored by: Palo Alto Networks

    In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.

  • Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

    Sponsored by: Certified Security Solutions (CSS)

    Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.

  • The Security Fabric of The Cloud

    Sponsored by: Fortinet, Inc.

    This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • The Changing Workforce: Automation & the Role of Ex-Hackers

    Sponsored by: Radware

    The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • NSS Labs 2016 Breach Detection System (BDS) Group Test Results

    Sponsored by: Fortinet, Inc.

    Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.

  • Report: The Impact of Security Threats on Business

    Sponsored by: Radware

    In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.

  • To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise

    Sponsored by: Radware

    Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • How Can Internet Hijacking be Prevented or Mitigated?

    Sponsored by: Dimension Data

    In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.