ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • KuppingerCole Leadership Compass: Access Management and Federation

    Sponsored by: IBM

    Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.

  • Unisys' Tom Patterson: 3 Key Steps in Securing Critical Infrastructure

    Sponsored by: Unisys

    In this video, Tom Patterson, VP and GM of Unysis Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.

  • Engineering Company's Multi Cloud Success Story

    Sponsored by: TrendMicro

    Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs

  • How Security has Failed us, and what you Can Do

    Sponsored by: Unisys

    Find out what Unisys Global Security Solutions GM, Tom Patterson, has to say about the state of security. Discover ways legacy systems have failed us, and what needs to be done to keep us safe.

  • The Power of Modern Access Management Tools

    Sponsored by: IBM

    Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.

  • What Business Advantages Cloud Has to Offer

    Sponsored by: Oracle Corporation

    Cloud has a lot to offer businesses, particularly small and mid-sized businesses (SMBs). This white paper takes an in-depth look at the advantages cloud computing has to offer and provides a case study that discusses how one organization benefited from cloud computing.

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read on to read three additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • Quantifying the Riskand Economic Impactof Bad Bots

    Sponsored by: Distil Networks

    Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.

  • Computer Weekly – 30 August 2016:Get protected

    Sponsored by: ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlight the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Take Back Control of Access Management

    Sponsored by: IBM

    Discover how an integrated approach to access management can reduce complexity and thwart security breaches. Find out the myriad benefits all-in-one access management technology can offer.

  • AMD MxGPU Is the World's First Hardware Virtualized GPU

    Sponsored by: AMD

    Discover how you can bring the power and features of a physical GPU to VDI and learn how you can get powerful 3D rendering and secure, consistent performance across all your apps.

  • Enterprise Security: What Erodes Confidence

    Sponsored by: Unisys

    True security experts know that it's time to lay simplistic perimeter defenses to rest -- before they continue to drain your resources. Explore this interview with Unisys' Chris Kloes as he offers insights from a recent security study.

  • Cloud Computing Solves Manufacturing's 21st Century Problems

    Sponsored by: Oracle Corporation

    The global cloud computing industry is growing 5 times faster than IT, and by 2020 one-third of all data will either exist in or pass through the cloud. Read on to learn about how a cloud computing platform plans to help manufacturers reduce cost and deploy applications 90% faster.

  • Online Archiving Now Easier Than Ever

    Sponsored by: LogicNow

    Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.

  • Case Study: Cut Mobile Data Costs and Bolster Security

    Sponsored by: Wandera

    Discover how Hillcrest identified and addressed its mobile data usage problem, and now is enjoying annual savings of roughly €34,700, equating to an 850% ROI. Learn how it cut its mobile bills by 68% and also protects its workers from browser malware, leaking apps, phishing attacks, poisoned cache exploits, and more.

  • Interview: One Trust Leader reveals how Security breeds Innovation

    Sponsored by: Unisys

    The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.

  • The Need For Comprehensive Email Security Is Greater Than Ever

    Sponsored by: LogicNow

    Discover how to keep your email secure, easily and affordably. Learn about how to deploy an adaptive spam defense, sophisticated threat detection, email continuity, and more.

  • 10 Reasons to Archive Your Email in the Cloud

    Sponsored by: LogicNow

    Discover 10 reasons why archiving your email in the cloud can give your enterprise an edge, including: hit the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.

  • Extend Your Access Management Regime To Office 365

    Sponsored by: IBM

    See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.

  • ESG Lab Review: Performance and Scalability as Key Firewall Requirements

    Sponsored by: Juniper Networks, Inc.

    A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.

  • Combat Escalating Threats to Your Data Center

    Sponsored by: Juniper Networks, Inc.

    This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.

  • The Current Landscape of Advanced Persistent Threats

    Sponsored by: Proofpoint, Inc.

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

  • Inside Job: A Better Strategy to Stop Insider Threats

    Sponsored by: Infor

    Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • Think Again if you believe your email archiving problems are solved with Office 365

    Sponsored by: LogicNow

    Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.