ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Rethinking Data Discovery And Data Classification

    Sponsored by: IBM

    Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.

  • The Move to Software-based Everything – How Secure is Programmable Infrastructure?

    Sponsored by: Cisco and Dimension Data

    Software-based systems promise more flexibility, scalability, and automation.But, how vulnerable is a programmable infrastructure? Access this white paper that discusses the vulnerability of programmable infrastructures and how to properly secure them.

  • OpenDNS Umbrella

    Sponsored by: OpenDNS

    Learn about a first line of defense that can protect your IT infrastructure and monitor for emergent threats.

  • Assessing the Impact of Organizational Change on Financial Systems

    Sponsored by: Infor

    Discover how stovepipe systems and legacy applications on life-support hamper the organization's ability to respond to change. Add shrinking budgets and limited resources to the mix, and the workloads placed on both IT and finance can become difficult to sustain.

  • Using Finance Applications for Better Process Efficiencies and Data Accuracy

    Sponsored by: Infor

    Discover how to identify and implement best-of-breed enterprise-level finance applications that improve process efficiencies and data accuracy, which trends show is increasingly critical to success.

  • Technology Platforms for Business Integration

    Sponsored by: Infor

    Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.

  • The Art and Science of Value Realization in the Cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • Going global: Get up and running quickly no matter where you need to go

    Sponsored by: Infor

    Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.

  • Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how you can utilize encrypted traffic management while granting complete visibility and control of SSL communications and the potential threats therein without requiring re-architecting the security infrastructure, nor impacting network performance.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Short Description: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is using it to sneak past other conventional security measures and how to stop it.

  • Tips for Streamlining Financial Processes and Providing Real Time Reporting

    Sponsored by: Infor

    Discover how to address the growing gap between what a modern financial department should be able to and what they are able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Sponsored by: AlienVault

    Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for UEBA, use machine learning to derive network context, and proven techniques from real customer deployments.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • Take a Behavioral Bite Out of Crime

    Sponsored by: Infor

    44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    Discover and debunk several pervasive myths about encrypted communications and gain a solid understanding of its growing importance. Read on to answer: do current security measures slow encrypted traffic by up to 80%? Can this encrypted traffic create blind spots in security? And more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Behavioral threat analytics

    Sponsored by: SearchSecurity.com

    This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.

  • Balancing Personalization and Trust in the Age of the Customer

    Sponsored by: Gigya

    Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Read on to find out how such an approach has increased massive increases in usable customer data for companies such as Danone and Forbes.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Read on to discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • The State of Cloud Security: 2016 Survey Results

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. In this webcast, view expert analysis of the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.