ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • 7 Ways to Improve Your Security Incident Response

    Sponsored by: Rsam

    There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.

  • Case Study: Groundbreaking Workforce Development Enabled by AWS

    Sponsored by: AWS - Sophos

    The Louisiana Department of Corrections (DOC) needed a secure way to provide online courses for inmates, ensuring that they stayed in the designated virtual environment. Access this case study to see how the DOC was able to launch the secure AWS environments they needed to put inmates on the path to career success.

  • Is the Endpoint Security Nightmare Ending?

    Sponsored by: SearchSecurity.com

    The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be.

  • 5 Questions Executives Should Be Asking Their Security Teams

    Sponsored by: Microsoft

    This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.

  • 3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

    Sponsored by: Citrix

    When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell and Microsoft

    Click inside to find the major trends and drivers forcing organizations to change or adopt new security procedures in the wake of evolving threats.

  • 3 Ways EFSS Enables Secure Content Collaboration

    Sponsored by: Citrix

    The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.

  • How to Secure Your Organization's Data in SaaS Apps

    Sponsored by: OneLogin

    According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.

  • IAM Case Study: How to Maximize Your ROI and Security

    Sponsored by: OneLogin

    Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.

  • 8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.

  • 2017 Security Threat Report: Executive Summary

    Sponsored by: Symantec

    Inside this summary of the larger 77-page 2017 Threat Report, discover 6 cyberattack insights and how they have evolved over the past year.

  • The Top Cyber Security Trends in ASEAN in 2017

    Sponsored by: ComputerWeekly.com

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

  • How to Meet Today's Data Protection Challenges

    Sponsored by: Dell EMC Intel®

    This ESG report, learn about technologies that can help you meet today's data protection challenges.

  • Your Shadow IT Discovery Best Practices Guide

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to guide your organization through the process of safely adopting cloud apps and services, mitigating the influence of shadow IT and reducing your security risk.

  • How to Ensure Secure and Compliant Cloud App Use

    Sponsored by: Symantec & Blue Coat Systems

    Cloud applications are becoming more vital to business, but securing them can be tricky. Discover 6 key guidelines to maximize the effectiveness of your CASB to help you remain secure and compliant with cloud apps.

  • Improve Your Cloud Security Without Adding Complexity

    Sponsored by: Symantec & Blue Coat Systems

    Discover how to improve your cloud security without adding complexity by learning how to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle.

  • Internet and Security Threat Report 2017

    Sponsored by: Symantec

    Inside this 77-page 2017 Internet Security Threat report, uncover current trends and analysis of today's cybersecurity issues and the evolution of malicious actors in the past 3 years. Discover where they might be going, the damage they've done, and much more.

  • Mobile Apps Risk: Protect without Hindering Productivity

    Sponsored by: Blue Cedar

    Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps.

  • Cloud Security: 6 Tips to Ensure Critical Data is Secure

    Sponsored by: WinMagic

    With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.

  • Mobile Security in Healthcare: Ensure HIPAA Compliance

    Sponsored by: BlackBerry

    Your mobile strategy requires an end-to-end solution for transmitting, managing, and storing data in compliance with HIPAA. Discover how to implement mobility in your healthcare organization and remain HIPAA compliant.

  • Mobile Security Risk Mitigation and Tips for Success

    Sponsored by: Blue Cedar

    Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.

  • 5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

    Sponsored by: Blue Cedar

    Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.

  • Case Study: Virtual Environments and Endpoints Secured

    Sponsored by: TrendMicro

    In this case study, discover how Cancer Research UK secured more than 2,000 active users across physical machines, VMware virtual desktops and mobile devices.

  • Top 5 IoT Deployment Best Practices

    Sponsored by: Hewlett Packard Enterprise

    Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.

  • Top Trends Shaping IAM in 2017

    Sponsored by: OneLogin

    With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.