ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Micro-segmentation: Security for Every Data Center

    Sponsored by: VMware

    Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: tCell

    Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.

  • Why Firewalls Alone Are no Longer Enough

    Sponsored by: VMware

    To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation. In this this white paper, learn more about the protection that network virtualization and micro-segmentation can provide your business.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

  • Your Guide to Trends in Mobile User Authentication

    Sponsored by: HID

    Discover the ever-expanding role of mobile devices in corporate IT in broadening the network perimeter; how this shift is giving users unprecedented access to resources, but also introduces a host of new security considerations; and how the risk of unauthorized access to these devices adds new requirements for user authentication.

  • Safeguard Data Across the Board Through Smarter Authorization Enablement

    Sponsored by: HID

    Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.

  • A Network Manager's Guide to Ransomware

    Sponsored by: Cisco and Dimension Data

    Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

  • Modern Security for the Modern Data Center

    Sponsored by: VMware

    Upgrading your data center security from an antiquated perimeter-based model is in your best interest if you don't want to end up dealing with the financial impact of a breach. Inside learn about a new, advanced data center security model that provides the protection your business needs for today and the future.

  • Mobile Identity Authentication: Today's Take on Trusted Identity

    Sponsored by: HID

    Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.

  • Modernizing Your Data Center's Security

    Sponsored by: VMware

    The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.

  • Secure Identity Experience in the Age of Connected Everything

    Sponsored by: HID

    Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.

  • Reduce the Number of Ransomware Infections Across Your Organization

    Sponsored by: Cisco and Dimension Data

    Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.

  • Case Study: Streamlining Security Without Creating Vulnerabilities

    Sponsored by: Cisco and Dimension Data

    Cuts to security in the name of "streamlining" can leave an organization vulnerable. Learn how a large pharmaceutical company made an important change in its security strategy when it started considering cost effectiveness.

  • Protect Your Data from Malicious Ransomware Threats

    Sponsored by: Veeam Software

    Ransomware attacks are on the rise, with almost 40% of businesses attacked. Even with strong countermeasures, networks are constantly penetrated. Access this white paper now to learn how to mitigate the risk of succumbing to a ransomware attack.

  • Investigating Surprise Attacks at the Application Layer: Bad Bot Report

    Sponsored by: Distil Networks

    Bad bots can do everything from maliciously scraping data from sites without permission to undertaking criminal activities, such as fraud and outright theft. Access this report to gain a unique, focused view on bad bot activity at the application layer (layer 7 of the OSI model).

  • Defining Modern Hybrid Security: Enable Cloud-powered Data Protection

    Sponsored by: Amazon Web Services

    With the blisteringly fast pace of change in cloud data protection, settling for architecture that doesn't provide what organizations are seeking is a death knell for data security. In this ESG report learn what, how, and why a hybrid cloud architecture could be right for your enterprise's data security needs.

  • 4 Market Trends Driving Mobile Banking

    Sponsored by: HID

    Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.

  • Your Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Cisco and Dimension Data

    Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.

  • Top IT Trends in 2017: Cybersecurity

    Sponsored by: Cisco and Dimension Data

    With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.

  • Top 5 Considerations: What to Look For in Mobile Banking Security

    Sponsored by: HID

    Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.

  • Single Secure Credential to Access Facilities and IT Resources

    Sponsored by: HID

    Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Keeping Your Office 365 Implementation Secure and Effective

    Sponsored by: Box

    In this webinar, learn how to handle security concerns in your Office 365 deployment. Also learn how to best address your content management needs before, during, and after Office 365 transition, and what you can do to help your employees make the most of the suite's features.

  • The Rise of the Secure Internet Gateway

    Sponsored by: Cisco and Dimension Data

    With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.