ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Data Security for the Digital Businesses

    Sponsored by: Hewlett Packard Enterprise

    How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.

  • 3 Steps to Taking Control of SaaS Apps

    Sponsored by: Palo Alto Networks

    In this tech brief, you'll find a quick 3-step guide to get SaaS under control and prevent threats.

  • Amp Up Your Endpoint Data Security

    Sponsored by: Dell and Microsoft

    More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.

  • Successfully migrating personnel data

    Sponsored by: Accenture

    Data migration, something only done when required, carries great potential risk to data integrity and inconsistency increases. Read on to learn about a data migration management solution that enables versatility and confidence in the face of a task that puts your data at risk.

  • Cybersecurity Buyer's Guide

    Sponsored by: Palo Alto Networks

    Inside you'll find criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

  • Securing Windows XP with Traps and Advanced Endpoint Protection

    Sponsored by: Palo Alto Networks

    Locate a way to continue using Windows XP even though its end-of-life has passed. Using a lightweight security client you can keep your legacy systems viable even longer.

  • Interoperability and the Cloud in Connected Health

    Sponsored by: CloudMine

    Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.

  • A letter from the CEO: Connected Health Cloud Release

    Sponsored by: CloudMine

    If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • Accelerating the Building, Managing, and Deployment of Healhcare Apps

    Sponsored by: CloudMine

    Discover how your healthcare organization can reduce initiative time to market by up to 70% and create a multimedia app compatible with almost any device to contain the overflow of patient information that is received every day.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • 5 Benefits of Building Apps for Healthcare

    Sponsored by: CloudMine

    In this infographic discover 5 benefits of building applications for healthcare, including secure and HIPAA compliant communication, increased interoperability, and more.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Improving Passwords is Critical to Modern Security

    Sponsored by: Verizon

    Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.

  • Case Study: Virtualization Strengthening Security

    Sponsored by: emc first distribution

    Learn how a government agency with very particular needs boosted performance for its systems that were struggling to secure a growing volume of important data on physical workstations.

  • China-Based eCommerce Site Hits the Target in Fraud Detection and Sales Growth

    Sponsored by: CyberSource

    Discover how you can prevent fraud loss, and boost sales by enabling legitimate transactions. This short resource discusses how a China based eCommerce site Banggood fortified itself against fraud with a new unified platform.

  • Health Care Security Is Personal: Act Now to Protect Patient Care

    Sponsored by: Optum

    In this white paper, learn how health care organizations can successfully manage threats and vulnerabilities in this ever-evolving landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

  • MetroDeal Securing Success, Managing Fraud

    Sponsored by: CyberSource

    Learn how one organization secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit.

  • IBM Security QRadar: SIEM Product Overview

    Sponsored by: IBM

    In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.

  • 6 Critical Trends in Smart Healthcare Technology

    Sponsored by: Avaya

    Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 1

    Sponsored by: Intel Security

    This webcast reviews security initiatives in order of their popularity for deployment. Access now to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • When to Adopt the Lift-and-Shift Cloud Migration Model

    Sponsored by: New Relic

    This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.