ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud

    Sponsored by: AT&T

    As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.

  • University of Texas at Austin Ensures Network Security for its Distributed Campus

    Sponsored by: Splunk

    Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.

  • The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails

    Sponsored by: Proofpoint, Inc.

    In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Internet of Things Security

    Sponsored by: SearchSecurity.com

    This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Citrix

    This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.

  • Credit Union Thwarts Cryptolocker Attack With Smart Backup Policy

    Sponsored by: SimpliVity

    One credit union found their banking applications stopped working due to the cryptolocker ransomware. This custom article takes a look at how their hyper-converged infrastructure contained a backup policy that enabled them to restore their virtual machines – without impacting performance or availability.

  • 10 Questions to Ask Your Vendor about File Gateway Consolidation

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • Accelerate Your Digital Business Through Cybersecurity

    Sponsored by: Dimension Data

    Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • The Mobile Enterprise: Is Ease of Use Overriding Security?

    Sponsored by: BlackBerry

    Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.

  • Mobile Security Checklist: Plan for Security and Compliance

    Sponsored by: Sierraware

    BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.

  • Designing Single Sign-On Architecture for Enhanced Security

    Sponsored by: CA Technologies

    This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.

  • How Cloud Services Giant Exostar Protected Sensitive Data and Applications

    Sponsored by: VMware, Inc.

    In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.

  • Make Micro-segmentation Work for Your Network: A Collection of Customer Stories

    Sponsored by: VMware, Inc.

    Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Enhancing Security and System Functionality with the Cloud

    Sponsored by: Splunk

    This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering tens of thousands in operational costs and reducing time resolution for errors.

  • Complete Analysis of the Top SIEM Vendors

    Sponsored by: AlienVault

    The Magic Quadrant summarizes Gartner's yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.

  • Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential

    Sponsored by: LogicNow

    This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.

  • Pervasive Security Enabled by Next Generation Monitoring Fabric

    Sponsored by: Big Switch Networks

    As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.

  • Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work

    Sponsored by: Sierraware

    As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.