ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Elevate's CISO Explains Why He Chose Masergy Managed Security

    Sponsored by: MASERGY

    One CISO was unhappy with the level of service that one managed security provider was showing. Watch this 2 minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons and why he chose to go with the provider he did.

  • 3 Reasons to Move to a Managed Security Service Provider

    Sponsored by: MASERGY

    The cyberthreat landscape is growing with every technological advance. Discover the top three reasons why you need to team up with a managed security service provider now.

  • Five Reasons to Adopt an MSSP

    Sponsored by: MASERGY

    Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.

  • Micro-Segmentation: A Demonstration

    Sponsored by: Unisys

    This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.

  • Facing Network Breach Threats, Visibility Is Key

    Sponsored by: Intel

    If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.

  • The Top Ten Things CIOs Ask About Enterprise Mobility

    Sponsored by: MobileIron

    Looking to develop and strong mobile strategy? With consumer choice now the driving force behind mobile enterprise decisions, CIOs must be prepared. Here are the top 10 questions CIOs commonly ask about enterprise mobility.

  • Liquidware Labs Solutions for Windows Desktop Migrations

    Sponsored by: Liquidware Labs

    Learn how you can simplify the migration of large deployments of physical Windows desktops environments. Discover how you can enable migrations to happen in the background without affecting user productivity.

  • Building a Cloud Network: What Does It Mean?

    Sponsored by: MASERGY

    Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.

  • Manufacturing Embraces the Industrial Internet of Things

    Sponsored by: Oracle Corporation

    This expert e-guide reveals the major considerations for manufacturers to keep in mind before investing in the Industrial Internet of Things (IIoT) and enabling an outside connection. Inside, industry veteran Dave Turbide explains how to mitigate security risks associated with the IIoT.

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • CEO Fraud: How to Stop Impersonation Attacks

    Sponsored by: Mimecast

    The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.

  • Move Your Email to the Cloud with Confidence

    Sponsored by: Mimecast

    As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.

  • IBM Data Protection for Virtual Environments

    Sponsored by: IBM

    Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.

  • Top 10 Security Priorities For US Healthcare Organizations

    Sponsored by: Absolute

    This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment

    Sponsored by: Amazon Web Services

    Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Business Intelligence: Enable Flexibility Without Sacrificing Security

    Sponsored by: Pyramid Analytics

    In this infographic, discover a BI platform that can enable flexibility and speed without sacrificing security or control. Learn about easily conducting complex analyses, generating rich visualizations, and scaling to match increased user needs.

  • Wireless Defense Strategies in the IoT Era

    Sponsored by: Fortinet, Inc.

    It's time to reevaluate access layer protection in enterprise WLANs and learn why deploying ad-hoc security is no longer enough to protect against threats. In this e-book, you'll read about new access layer defense strategies, and tips on how to select a secure WLAN solution.

  • Making the Case for SMB Security Services

    Sponsored by: CDW

    In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch out for. Learn how SMBs can create a strong security strategy to prevent and mitigate attacks.

  • Building a Security Fabric for Today's Networks

    Sponsored by: Fortinet, Inc.

    Leverage firewalls to build an enterprise network security system that focuses on deploying defensive strategies through the entire enterprise, not just around the perimeter.

  • Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

    Sponsored by: IBM MaaS360

    Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.

  • Protect Patient Data with Strong Desktop Security

    Sponsored by: Aventura

    Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.