ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    Learn the essentials of formulating a mature information security program from this white paper, which will clarify the major points of contention surrounding the HITRUST Common Security Framework (CSF) Assurance Program. Access now to obtain answers to 20 FAQ to bolster the security posture of your healthcare organization.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Health Care Security Is Personal: Act Now to Protect Patient Care

    Sponsored by: Optum

    In this white paper, learn how health care organizations can successfully manage threats and vulnerabilities in this ever-evolving landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Defend Against the Undetected

    Sponsored by: Fortinet, Inc.

    This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

  • BYOD Mobile Device Management

    Sponsored by: IBM

    Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.

  • Mobile Threat Management

    Sponsored by: IBM

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.

  • BYOD Cross-Platform Security: Protecting Enterprise Data

    Sponsored by: IBM

    In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • QRadar SIEM

    Sponsored by: IBM

    Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.

  • Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence

    Sponsored by: IBM

    With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting

    Sponsored by: Proofpoint, Inc.

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.