ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

    Sponsored by: APC by Schneider Electric

    Digital remote monitoring has evolved to become cloud-based and involve multiple channels, but this opens you up to attack. Access this white paper for an overview of secure development lifecycle (SDL) and 8 key practices that will enable you to design and build your data center remote monitoring platform without putting your security at risk.

  • Governing GPOs with a Layered Security Framework

    Sponsored by: Quest

    Despite Group Policy Objects (GPOs), security measures can still be circumvented or disrupted. Access this whitepaper to learn how to implement a layered security architecture, preventing the wrong hands from tampering with critical GPOs.

  • 3 Steps to Improving Incident Response

    Sponsored by: Symantec & Blue Coat Systems

    Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.

  • Get smart about threat intel tools and services

    Sponsored by: SearchSecurity.com

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • Focus: Securing the cloud

    Sponsored by: ComputerWeekly.com

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

  • The new EUsecurityrequirements and you

    Sponsored by: Symantec & Blue Coat Systems

    This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.

  • Secure Information Exchange in the Digital Age

    Sponsored by: OpenText

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • In 2017, the insider threat epidemic begins

    Sponsored by: ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Cybersecurity and Overcoming the Intelligence Disconnect

    Sponsored by: BAE Systems

    Cybersecurity is now a business risk issue like any other. In this research report, discover how to unite the two different perspectives of the C-Suite and IT decision-makers, especially in regards to what threats they think are greatest, who's accountable for defense, how to use outsourcing, and more.

  • Hacking the Human Operating System

    Sponsored by: ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • 4 Essential Capabilities for Advanced Malware Protection

    Sponsored by: Cisco Systems, Inc.

    Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.

  • Ransomware: Block Attackers with a Layered Defense

    Sponsored by: Cisco Systems, Inc.

    Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.

  • Expert Viewpoints on Access Management and Federation

    Sponsored by: IBM

    Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way.

  • Protect Your Critical Assets with Identity Governance and Intelligence

    Sponsored by: IBM

    Learn how integrating policy and governance controls with identity management processes would help your organization undersand, control, and make better business decisions related to access and risk.

  • Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place

    Sponsored by: Dell SonicWALL

    Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.

  • Eight Best Practices To Prevent Your Data From Being Held Hostage

    Sponsored by: Dell SonicWALL

    Discover these 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.

  • Office 365: Should You Allow Traffic to Bypass the Proxy?

    Sponsored by: Symantec & Blue Coat Systems

    When migrating to cloud-based Office 365 deployments, organizations are faced with the decision for its traffic to bypass the proxy or not. Learn the negatives of allowing Office 365 traffic to bypass the proxy and what to do about it.

  • 2016 Mobile Security & Business Transformation Study

    Sponsored by: IBM MaaS360

    Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.

  • Get proactive about Incident ResponseWith the Blue Coat Advanced Threat Assessment

    Sponsored by: Symantec & Blue Coat Systems

    Uncover the reasons behind how today's threats can bypass traditional security measures and what an organization can do to respond to modern, seemingly undetectable malware and attacks.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • How Data Privacy Laws Impact Cloud Adoption In The UK

    Sponsored by: Symantec & Blue Coat Systems

    Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.

  • Security Rating Scores for Third-Party Vendors Catching On

    Sponsored by: BitSight

    In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.

  • SWIFT Network Communications: How Can Security Be Improved?

    Sponsored by: BAE Systems Applied Intelligence

    In this e-guide, experts describe how cybercriminals are abusing the SWIFT network to steal millions of dollars. Learn what can be done to prevent systems like SWIFT from being used to defraud its clients.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.