ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Are You Leaving the Door Open for Cyber Threats?

    Sponsored by: Palo Alto Networks

    In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.

  • The Cyber Threat Guide

    Sponsored by: LogicNow

    This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?

  • 5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veritas

    Sponsored by: Commvault

    Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.

  • Important Modern Trends in Digital Banking

    Sponsored by: HID

    Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.

  • CW ANZ - December 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • 5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veeam Software

    Sponsored by: Commvault

    Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.

  • How Many Network Connected Medical Devices Does Your Organization Have?

    Sponsored by: Zingbox

    IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them.

  • 5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With EMC Software

    Sponsored by: Commvault

    Learn five reasons why you should rethink your data protection and information management software. Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • What to Look for in Incident Response Management Tools

    Sponsored by: SearchSecurity.com

    Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital.

  • Facts About the Cloud

    Sponsored by: Sage Live

    By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology.

  • Give Them Access. NOT a VPN

    Sponsored by: Bomgar Corp.

    Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.

  • Guide & Checklist to Container Security

    Sponsored by: NeuVector

    This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.

  • Definitive Guide to Cloud Access Security Brokers

    Sponsored by: BitGlass

    In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.

  • BYOD and Mobile Security Report

    Sponsored by: BitGlass

    Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • Securing BYOD without MDM

    Sponsored by: BitGlass

    Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • How Midmarket IT Leaders Can Improve Their Data Security

    Sponsored by: Arctic Wolf Networks, Inc.

    This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.