ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • A Risk-Driven Identity And Access Management Process Framework

    Sponsored by: Microsoft

    This Forrester Research report outlines how to use behavior-based trending methods in your identity and access management strategy to reduce security exposures and improve the user experience.

  • Breach Detection Systems Test Report

    Sponsored by: TrendMicro

    In this breach detection report, discover the findings from an independent test of the Trend Micro Deep Discovery Inspector Model v3.8 SP5 and OfficeScan v12.0.1807 based on security effectiveness, network device performance and total cost of ownership.

  • The Australian Privacy Amendment Explored

    Sponsored by: Rapid7

    Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.

  • GDPR Compliance: How to Comply with 3 Key Articles

    Sponsored by: Rapid7

    While it will take a collection of services and tools to get into full compliance with the new General Data Protection Regulation (GDPR), security is a key piece. In this white paper, learn about a service which can help you prepare to meet 3 of the GDPR's articles so that you are ready to face this new law on every level of your IT environment.

  • Exploring Incident Response Sevices

    Sponsored by: Rapid7

    In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.

  • Discover a Fully Managed Detection and Response System

    Sponsored by: Rapid7

    Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.

  • Data + Security = A Most Unvirtuous Relationship

    Sponsored by: Delphix

    Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.

  • Next-Generation Firewalls: The Cornerstone of Future Security

    Sponsored by: Palo Alto Networks

    Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.

  • Delivering Fortinet Security to AWS GovCloud Customers

    Sponsored by: AWS - Fortinet

    In this resource, uncover the 6 virtual security products optimized for AWS to help your organization with a secure and future-proof transition to a cloud environment.

  • Protecting the Financial Services Organization

    Sponsored by: Juniper Networks, Inc.

    Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.

  • Busting the Myth of the Malware "Silver Bullet"

    Sponsored by: McAfee, Inc.

    Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.

  • Discover an Advanced Cloud-Based Threat Prevention Suite

    Sponsored by: Juniper Networks, Inc.

    Inside this tech overview, learn about Sky Advanced Threat Prevention, a cloud-based service with features built to adapt to the ever-changing threat landscape and fend off today's ransomware and DDoS attacks.

  • Discover how BorrowersFirst chose their colocation provider

    Sponsored by: Peak10

    In this case study, learn why the online lending company BorrowsFirst chose Peak 10 + ViaWest as their colocation provider. Click inside to learn what they gained like quick and simple deployment, simplified compliance management, and more.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • How to Build a Rock-Solid Software Security Initiative in 5 Steps

    Sponsored by: Synopsys

    Find out how security pros and app development teams can work together better to ensure app security, and discover your roadmap to building a sound software security initiative.

  • Cisco Stealthwatch Cloud: Features and Benefits

    Sponsored by: AWS-Cisco

    The cloud offers a myriad of benefits, but only when it is protected. One way to ensure your cloud's security is through monitoring and incident response. Find out how to leverage this security tool to monitor both your public cloud and your private network.

  • Outsmarting Malware

    Sponsored by: Juniper Networks, Inc.

    Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.

  • 5 Key Analytics and Machine Learning Takeaways

    Sponsored by: Splunk

    Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.

  • A Secure, IT-Approved File Sharing Alternative to Shadow IT

    Sponsored by: Citrix

    Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.

  • Learn How You can Simplify Mobile Security

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • Game Changer: Emergency SaaS Notifications Enabled by the Hybrid Cloud

    Sponsored by: TeraGo Networks

    In this case study, learn how RMS Software Inc. was able to secure their SaaS-based emergency notification system using hybrid cloud capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.