ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • What to Look for in Incident Response Management Tools

    Sponsored by: SearchSecurity.com

    Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.

  • Definitive Guide to Cloud Access Security Brokers

    Sponsored by: BitGlass

    In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.

  • BYOD and Mobile Security Report

    Sponsored by: BitGlass

    Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • How MDM Software Exposes Your Personal Data

    Sponsored by: BitGlass

    Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • The Top Cybersecurity Risks – And How Enterprises Are Responding

    Sponsored by: Arctic Wolf Networks, Inc.

    Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.

  • Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers

    Sponsored by: Bomgar Corp.

    Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.

  • The 7 Step Hack: Thinking Like a Cybercriminal

    Sponsored by: Bomgar Corp.

    Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.

  • 5 Keys to Boosting Cloud Security Confidence

    Sponsored by: BitGlass

    Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.

  • Arapahoe House Secures BYOD

    Sponsored by: BitGlass

    In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more.

  • Market Analysis for 18 Featured Endpoint Protection Platforms

    Sponsored by: Trend Micro

    Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.

  • Modern Snapshot Management - Enhancing Application Protection and Recovery

    Sponsored by: Commvault

    Discover how to unlock the power within your current hardware investments, improving recovery across all applications and delivering faster and more granular application-aware recovery performance.

  • Endpoint Security Suites: How 15 Providers Stack Up

    Sponsored by: Trend Micro

    In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.

  • Optimize Your SIEM Operations

    Sponsored by: Intel Security

    Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.

  • Market Guide for Cloud Access Security Brokers

    Sponsored by: BitGlass

    Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.

  • Beyond Next-Gen: Defining Future-ready Endpoint Security

    Sponsored by: Trend Micro

    ESG conducted market research to explore how organizations employ advanced endpoint security controls. Learn how the endpoint itself has changed, how its weaknesses are exploited to perpetuate attacks, and the techniques and controls that can mitigate them.

  • Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies

    Sponsored by: Trend Micro

    IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.

  • Create a Customized Testing Strategy

    Sponsored by: IBM

    Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.

  • SIEM Analysis Interfaces for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.