ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Learn How You can Simplify Mobile Security

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • A Solution for Managing Privileged Access

    Sponsored by: Devolutions

    For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.

  • Better Security for Better Business

    Sponsored by: Dell India

    In this infographic learn how to use your security system not only to protect your data but to empower the future of your company by balancing protection, with compliance and enablement.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Cloud Secure Virtualization Datasheet

    Sponsored by: IBM

    Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.

  • TOP 10 Considerations for Bot Management

    Sponsored by: Akamai Technologies

    There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.

  • Is Your IT Security Affecting Your Workforce Productivity?

    Sponsored by: Dell and Microsoft

    In this video, Principal Analyst at Forrester Research David K. Johnson demonstrates how to achieve the often-conflicting goals of promoting employee flexibility alongside delivering greater device security. Tune in to overcome the risks BYOD programs, device malware, and more pose to your device landscape.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Data Breaches: Protect Your Organization with an Incident Response Program

    Sponsored by: Cisco Systems, Inc.

    When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.

  • Bots to the Future – Why Bot Management Solutions are Necessary to Stop Hackers

    Sponsored by: Akamai Technologies

    This Frost and Sullivan review seeks to explore the challenges presented by bots, emerging solutions for bot management, and the potential market for these systems.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.

  • Combining Data Loss Protection with Cloud Access Security Broker Technology

    Sponsored by: Symantec

    Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.

  • A 5 Minute Guide to Security for Cognitive Search and Knowledge Management

    Sponsored by: Attivio, Inc.

    Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

  • How Hybrid Approaches to Data Infrastructure Keep you Protected 24/7

    Sponsored by: J2 Cloud Services

    In this online resource, learn how a hybrid approach to data infrastructure gives your business an increased level of reliability, adaptability, and agility for a more advanced data sharing capability.

  • Detecting Unknown Malware and Ransomware

    Sponsored by: Splunk

    Learn how you can protect your network from the threat of ransomware by collecting all Windows Sysinternal data through event logs, and running it through a thorough analytics program to search and analyze anomalies.

  • New Security Challenges Redefine Risk and Vulnerability

    Sponsored by: Fortinet, Inc.

    Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.

  • Reducing Attacker Dwell Time

    Sponsored by: Infocyte

    Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.

  • WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)

    Sponsored by: Kaspersky Lab

    For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • Next Generation Firewall Comparative Report

    Sponsored by: Cisco Systems, Inc.

    This report examines 11 next generation firewalls, evaluating for overall security, performance, and TCO. Take a look to see which providers lead the pack, which ones to avoid, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.