ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Fighting IP Telephony Fraud with Oracle Enterprise Session Border Controllers

    Sponsored by: Oracle Corporation

    This case study reviews common IP telephony scams and explains how the new technology can help network administrators combat service theft and mitigate risks.

  • Extend Security and Control from the Data Center Edge to the Core

    Sponsored by: VMware

    The average total cost of a data breach for companies increased 23 percent on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation allows your security team to focus on the problem areas and minimize resource usage. Access this eBook to learn more about this technology and better secure your data.

  • Survey Results: Mapping the Cloud Maturity Curve

    Sponsored by: IBM

    This resource presents survey results on cloud maturity. Discover the 5 essential characteristics of high-maturity organizations, and learn about the biggest challenges that hold enterprises back from achieving cloud maturity.

  • Discovering Security Analytics Use Cases

    Sponsored by: Prelert

    In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Client Virtualization Solutions Made Simple

    Sponsored by: Dell, Inc., Intel and VMware

    This white paper details how client virtualization strategies have made it simpler to procure, deploy, scale, and manage virtual desktops. Read on and you'll learn the benefits of deploying client virtualization strategies using hyper-converged systems.

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • Customer Story:¬†Kuwait Petroleum Corporation

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Ensuring Document Security Across Any Device

    Sponsored by: BlackBerry

    Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.

  • Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs

    Sponsored by: Dell, Inc., Intel and VMware

    As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.

  • Brasfield and Gorrie builds productivity and security with paperless collaboration

    Sponsored by: Citrix

    Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.

  • Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings

    Sponsored by: Dell, Inc., Intel and VMware

    Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.

  • SCIENCELOGIC: Unmatched Visibility into Open Source with Black Duck

    Sponsored by: Black Duck Software

    This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improved efficiency and, most importantly, security by reviewing their code before their products hit the market and seeing exactly what they needed to change.

  • A Computer Weekly Buyer's Guide to Access Control

    Sponsored by: ComputerWeekly.com

    In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.

  • For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud

    Sponsored by: AT&T

    As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails

    Sponsored by: Proofpoint, Inc.

    In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Internet of Things Security

    Sponsored by: SearchSecurity.com

    This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.

  • Building the Next-Generation End-to-End IP Communications Architecture

    Sponsored by: Oracle Corporation

    Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.

  • Communications Security: A Blueprint for Enterprise Session Border Controller Deployments

    Sponsored by: Oracle Corporation

    Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.

  • 2015 Gartner Group Magic Quadrant on Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • A Foundation for Next-Generation Datacenter and Cloud-Based Security

    Sponsored by: Citrix

    Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.

  • The Search for Answers to 'Advanced Threat' Defense

    Sponsored by: Dimension Data

    This e-guide introduces a report that looks at mobile data protection. It also identifies strategies which companies are using to improve monitoring of corporate data, and prevent its loss through mobile applications and devices.

  • Disrupting Targeted Attacks Solution Guide

    Sponsored by: Intel Security

    This white paper makes it easy to reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now to learn and adapt to keep your critical information and infrastructure safer.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.