ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • Time to Toughen Up for IoT

    Sponsored by: SearchSecurity.com

    The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Watch on to see how systems are deployed through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives

    Sponsored by: Dell, Inc. and Intel®

    Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.

  • Securing Agile IT: Common Pitfalls, Best Practices and Surprises

    Sponsored by: CloudPassage

    Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • Definitive Guide: Securing the Mobile Enterprise

    Sponsored by: Aruba Networks

    While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.

  • 9 Ways Cybercriminals Can Compromise Business Communications

    Sponsored by: MASERGY

    Learn 9 of the most serious threats to your VoIP devices and networks in order to fight off determined cybercriminals.

  • Two Approaches to Cloud Security: API vs. Proxy

    Sponsored by: Palerra Inc.

    Uncover the difference between two different Cloud Access Security Broker (CASB) deployment strategies, API and Proxy, and what they can do to provide cloud security for your enterprise. You'll find a comparison of their features, learn how to decipher multimode CASBs, and more.

  • AWS Cautionary Tales and How to Avoid Becoming One

    Sponsored by: Palerra Inc.

    AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.

  • Salesforce Shield for Healthcare

    Sponsored by: Salesforce.com

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

  • State of PAM 2016

    Sponsored by: Thycotic

    In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.

  • Mobile Threat Prevention Behavioral Risk Analysis

    Sponsored by: Check Point Software Technologies Ltd.

    Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.

  • Hackers Are Poised to Compromise Your Communications Networks

    Sponsored by: MASERGY

    VoIP technology has introduced new security concerns to the enterprise. Access this white paper now to learn about today's 9 most serious security concerns introduced by VoIP, and how to counteract them.

  • Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations

    Sponsored by: Accenture

    Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.

  • Understand the Hype around Mobile Data Security Threats

    Sponsored by: Check Point Software Technologies Ltd.

    In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.

  • Mobility In Government Services: A Checklist Towards Regulatory Compliance

    Sponsored by: BlackBerry

    Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.

  • How to get the best protection from your CASB

    Sponsored by: Palerra Inc.

    Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.

  • Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.

  • Demystifying Mobile Security Attacks

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.

  • Can a CASB Protect You from the 2016 Treacherous 12? Infographic

    Sponsored by: Palerra Inc.

    Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.

  • How to Craft SSO and IAM Strategies on the Cloud

    Sponsored by: OneLogin

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • Is UTM Ready for the Big Leagues?

    Sponsored by: SearchSecurity.com

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.