ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Advanced Malware Protection: A Buyer's Guide

    Sponsored by: Cisco Systems, Inc.

    This white paper identifies the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and shows you how to combat today's advanced malware attacks using a combination of four techniques.

  • Ransomware: Block Attackers with a Layered Defense

    Sponsored by: Cisco Systems, Inc.

    Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.

  • Expert Viewpoints on Access Management and Federation

    Sponsored by: IBM

    Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way.

  • Protect Your Critical Assets with Identity Governance and Intelligence

    Sponsored by: IBM

    Learn how integrating policy and governance controls with identity management processes would help your organization undersand, control, and make better business decisions related to access and risk.

  • Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place

    Sponsored by: Dell SonicWALL

    Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.

  • Eight Best Practices To Prevent Your Data From Being Held Hostage

    Sponsored by: Dell SonicWALL

    Discover these 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.

  • 2016 Mobile Security & Business Transformation Study

    Sponsored by: IBM MaaS360

    Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.

  • Get proactive about Incident ResponseWith the Blue Coat Advanced Threat Assessment

    Sponsored by: Symantec & Blue Coat Systems

    Uncover the reasons behind how today's threats can bypass traditional security measures and what an organization can do to respond to modern, seemingly undetectable malware and attacks.

  • How Data Privacy Laws Impact Cloud Adoption In The UK

    Sponsored by: Symantec & Blue Coat Systems

    Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.

  • Security Rating Scores for Third-Party Vendors Catching On

    Sponsored by: BitSight

    In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.

  • App Security: Shore up the Weaknesses in Your WAF

    Sponsored by: tCell

    Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.

  • Sonicwall 2017 Annual Threat Report

    Sponsored by: Dell SonicWALL

    The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.

  • 10 Tips for Protecting Data in the Cloud

    Sponsored by: Symantec & Blue Coat Systems

    Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.

  • What's The Best Risk Analysis Method for Enterprises?

    Sponsored by: Presidio Networked Solutions

    In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.

  • Email Security Threats: Not Just from the Outside

    Sponsored by: Mimecast

    Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • The Mimecast Email Security Risk Assessment 2017

    Sponsored by: Mimecast

    By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.

  • A CISO Perspective: Why Unified Security Solutions are a Necessity

    Sponsored by: Forcepoint

    Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.

  • IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment

    Sponsored by: Forcepoint

    In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.

  • Your Guide to Today's Corporate Web Security

    Sponsored by: Forcepoint

    Gain insight into the corporate security market with this guide filled with detailed biographies of vendors, analytics of its changing landscape, and a structured way to evaluate any solution.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.