ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Move Your Email to the Cloud with Confidence

    Sponsored by: Mimecast

    As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.

  • Top 10 Security Priorities For US Healthcare Organizations

    Sponsored by: Absolute

    This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • Help Your Security Team Sleep at Night

    Sponsored by: Riverbed Technology, Inc.

    This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • What Are the Best Ways to Improve SMB Security?

    Sponsored by: CDW

    Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.

  • Public or Private, Instances in the Cloud Need Protection

    Sponsored by: Unisys

    Explore capabilities that conceal your instances in both private and public cloud environments.

  • Enterprise Security Innovation on the AWS Cloud

    Sponsored by: Unisys

    One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.

  • Cloud Security: Advanced, Efficient, and Trusted

    Sponsored by: Unisys

    Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.

  • How One Security Expert is Exploring Modern Threats to Enterprises

    Sponsored by: Check Point Software Technologies Ltd.

    Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • E-Waste Is More Than Just Clutter – It’s A Security Issue

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud

    Sponsored by: Unisys

    Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Why Traditional Data and Network Security is Not Good Enough

    Sponsored by: Unisys

    Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Information Security magazine: Insider Edition

    Sponsored by: SearchSecurity.com

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing perimeter and bring on board the best new security tools to protect your enterprise.

  • Threat Defense Isn't Just About Detection: It's How Your Respond

    Sponsored by: Intel Security

    Discover how to leverage endpoint detection and response (EDR) to create truly intelligent endpoints that automatically detect and respond to threats before they do their damage. Additionally, read on to see 5 criteria to look for when researching EDR solutions so you can determine which are most proactive in helping to prevent attacks.

  • Case Study: Global Security Management Made Easier for Leading IT Service Provider

    Sponsored by: Intel Security

    Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.

  • Operationalizing Threat Intelligence

    Sponsored by: Intel Security

    Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.

  • Security Operations Centers: The Key to the Future

    Sponsored by: Intel

    Security operations centers (SOCs) can help enterprises gain better visibility into their environments. In this resource, expert Eric Cole explains how to get the most out of SOCs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.