ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Important Considerations for Comparing Data Protection Vendors

    Sponsored by: Commvault

    What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • What to Look for in Incident Response Management Tools

    Sponsored by: SearchSecurity.com

    Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital.

  • Facts About the Cloud

    Sponsored by: Sage Live

    By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology.

  • Give Them Access. NOT a VPN

    Sponsored by: Bomgar Corp.

    Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.

  • Guide & Checklist to Container Security

    Sponsored by: NeuVector

    This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.

  • Definitive Guide to Cloud Access Security Brokers

    Sponsored by: BitGlass

    In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.

  • 2016 BYOD and Mobile Security Spotlight Report

    Sponsored by: BitGlass

    With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • Securing BYOD without MDM

    Sponsored by: BitGlass

    Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • How Midmarket IT Leaders Can Improve Their Data Security

    Sponsored by: Arctic Wolf Networks, Inc.

    This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.

  • A CIO’s Guide for Reducing Security Anxiety

    Sponsored by: BitSight

    Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Marisol Enables Secure BYOD

    Sponsored by: BitGlass

    Learn how Marisol International enabled secure access to corporate data form any mobile device without the need for software agents. Discover how they can now access rich visibility and analytics, enabled selective wipe of corporate data, and more.

  • How MDM Software Exposes Your Personal Data

    Sponsored by: BitGlass

    Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • Top 6 Cloud Data Protection Challenges. Solved.

    Sponsored by: Commvault

    Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more.

  • The Top Cybersecurity Risks – And How Enterprises Are Responding

    Sponsored by: Arctic Wolf Networks, Inc.

    Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.

  • Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers

    Sponsored by: Bomgar Corp.

    Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.

  • Why DevOps + Security = A Bright Idea

    Sponsored by: SearchSecurity.com

    By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.

  • Top 5 SIEM Challenges for the Midmarket

    Sponsored by: Arctic Wolf Networks, Inc.

    Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.

  • Basic SIEM Analytics Steps to Know

    Sponsored by: LogRhythm, Inc.

    This e-guide outlines a beginning for your SIEM implementation strategy. By breaking down SIEM analytics into steps, you can provide your enterprise with improved security management.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.