ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • The Mobile Enterprise: Is Ease of Use Overriding Security?

    Sponsored by: BlackBerry

    Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.

  • Ditching Legacy Tokens

    Sponsored by: BlackBerry

    While legacy tokens still hold 70% of the user authentication market, Gartner predicts a shift towards the phone as a token. Access this white paper to learn where legacy tokens are falling short and how emerging technologies go further by retaining all the security of legacy solutions while reducing costs and simplifying the end-user experience.

  • Improve User Acquisition with Purpose-Built Customer Identity & Access Management

    Sponsored by: Gigya

    Customizing pre-existing employee identity and access management systems for customer identities is a costly and risky process. Learn how a purpose-built customer identity and access management solution can help you securely manage millions of global user identities, maintain privacy compliance, and minimize IT maintenance.

  • We’ve Been Breached- Now What?

    Sponsored by: eSentire

    This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.

  • The CIO’s Guide to EMM

    Sponsored by: BlackBerry

    Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?

  • Case Study: API Gateway Secures Public APIs and Minimizes Costs

    Sponsored by: Axway

    APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.

  • Mobile Security Checklist: Plan for Security and Compliance

    Sponsored by: Sierraware

    BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.

  • Case Study: Industry’s Largest NFV Deployment

    Sponsored by: Big Switch Networks

    NFV deployments represent some of the most demanding workloads in OpenStack clouds, yet the economic and operational promise of NFV makes this a high-value technical challenge for service providers worldwide. Access this case study to see how three major companies came together for the industry's largest NFV deployment.

  • Solving the Top 11 API Threats

    Sponsored by: Axway

    How can you ensure that APIs offer optimal functionality while minimizing their security vulnerabilities? Discover the 11 most critical API threats and the countermeasures that can help you thwart them.

  • Designing Single Sign-On Architecture for Enhanced Security

    Sponsored by: CA Technologies

    This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.

  • How Cloud Services Giant Exostar Protected Sensitive Data and Applications

    Sponsored by: VMware, Inc.

    In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.

  • 9 Best Practices to Build a Digital Business Architecture

    Sponsored by: Axway

    APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.

  • Make Micro-segmentation Work for Your Network: A Collection of Customer Stories

    Sponsored by: VMware, Inc.

    Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.

  • Using Splunk to Manage AWS: Gaining Transparency into Cloud Computing

    Sponsored by: Splunk

    This webcast explores how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with an identity access management feature along with a data management platform to improve the security of their data. Watch now to find out how they were able to reduce costs of their infrastructure.

  • Enhancing Security and System Functionality with the Cloud

    Sponsored by: Splunk

    This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering tens of thousands in operational costs and reducing time resolution for errors.

  • Unified Endpoint Management, Enabling the Workspace

    Sponsored by: MicroFocus

    This resource details an end-to-end management and protection suite designed to manage your users' workspaces, no matter whether the environment is physical, virtual, or cloud. Access now and you'll learn about the technical specifications and features of this suite.

  • Guide to Flexible Working

    Sponsored by: ComputerWeekly.com

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

  • Cloud Computing and Banking: Combatting ATM Fraud

    Sponsored by: Splunk

    In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.

  • The Next Step in Mobility: Virtual Mobile Infrastructure

    Sponsored by: Sierraware

    Virtual mobile infrastructure (VMI) is an emerging technology with a promising future that is going to change the way that mobile apps are run and utilized across different platforms. This exclusive guide, Brian Madden discusses what you need to know about VMI and what it means for the future of mobile devices.

  • Tidelands Health: Dynamically Roaming Sessions, Accessing Critical Data from Any Computer

    Sponsored by: Aventura

    Clinicians at Tidelands Health were frustrated with their inefficient PC workflows causing delayed log on times and reducing caregiver collaboration. This case study reveals how they implemented a platform integrating both VDI and server-based computing technologies to improve workflows almost immediately, enabling better patient care.

  • Growing Security Concerns Across Industries

    Sponsored by: Dell, Inc.

    This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.

  • Into the Breach: Tightening Security in Today’s Healthcare Organization

    Sponsored by: Aventura

    Download this infographic to uncover the key security issues, and the challenges of securing healthcare information today. Learn how you can boost healthcare IT system security with key recommendations.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.