ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • MetroDeal Securing Success, Managing Fraud

    Sponsored by: CyberSource

    Learn how one organization secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Secure Enterprise Email on Mobile Devices

    Sponsored by: IBM

    Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

  • Mobile Threat Management

    Sponsored by: IBM

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.

  • Privacy Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Discover the questions that every cloud user should be asking their providers. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how they actually handle data security and privacy, don't assume each provider hold the same terms and conditions, and more.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence

    Sponsored by: IBM

    With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • How Tech-Savvy Workers are Affecting Enterprise Security

    Sponsored by: Unisys

    Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.

  • Cybersecurity as a Growth Advantage

    Sponsored by: Cisco

    Don't stifle your innovation potential. Join the discussion on how cybersecurity plays a role in our current economy, threats to be aware of, and the business benefits it enables.

  • 2016 Next-gen Infrastructure Security Report

    Sponsored by: Illumio

    The modern cybersecurity landscape is changing, how far are you willing to go to stay safe? This 2016 Next-gen Infrastructure Security Report will provide an overview of technology focusing on cloud and the challenges emerging with the software-defined anything (SDx) infrastructure.

  • Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy

    Sponsored by: Intersect Alliance

    Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.

  • Healthcare CIOs Share Cybersecurity Best Practices

    Sponsored by: Symantec Corporation

    Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.

  • The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim

    Sponsored by: Unisys

    Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.

  • There's Never Been A Better Time to Worry Less and Innovate More

    Sponsored by: Cisco

    You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.

  • Modern Adaptive Security

    Sponsored by: Illumio

    Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.

  • When to Adopt the Lift-and-Shift Cloud Migration Model

    Sponsored by: New Relic

    This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.