ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Email-borne Malware Highlights Danger of Over-reliance on Sandboxes

    Sponsored by: Mimecast North America

    Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have skyrocketed recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast North America

    Learn how the cloud has revolutionized email archiving and what your enterprise can do to ensure its compliance, security, and retrieval capabilities.

  • Ransomware is Increasing the Risks and Impact to Organizations

    Sponsored by: Mimecast North America

    Discover the increasing risk and impact of ransomware on the enterprise and what can be done to mitigate its effect. Learn about ransomware attack vectors, the real price of an attack, how to prevent ransomware, and more.

  • Email Security in a Zero Trust World

    Sponsored by: Mimecast North America

    Learn why your security response shouldn't solely be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.

  • Navigating Market Complexity to Fulfill Network Security Requirements

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.

  • Secure Wi-Fi Helped The Museum of Flight Soar to New Heights

    Sponsored by: WatchGuard Technologies, Inc.

    In this case study, find out how The Museum of Flight was able to easily block inappropriate and malicious web content, swiftly deploy new access points, scale up or out their Wi-Fi at any given moment, and more.

  • Improve Network Security Speed and Performance

    Sponsored by: WatchGuard Technologies, Inc.

    In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.

  • What are the Real Costs of the DIY ELK Stack?

    Sponsored by: Logentries

    Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more.

  • Gain Complete Control of Your Digital Ecosystem with PKI

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Technology, media and telecommunications predictions 2017

    Sponsored by: ComputerWeekly.com

    Deloitte predicts the key trends in technology, media and telecommunications in 2017

  • Information Security magazine Insider Edition, January 2017

    Sponsored by: SearchSecurity.com

    Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing.

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the new popular targets for hackers, common weak-points in organization's infrastructure, and more.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • 7 Ways To Make Yourself Hard To Hack

    Sponsored by: Solarwinds MSP

    Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.

  • School District Ensures Data Protection with Network Security Appliance

    Sponsored by: WatchGuard Technologies, Inc.

    One school district, with over 1,200 students and 400 staff members, needed to protect confidential data, remain compliant with CIPA (Children's Internet Protection Act) and improve visibility and control over web applications. In this case study, learn how the school was able to meet their needs with one advanced, network security appliance.

  • Secure, Cloud-Managed Wifi

    Sponsored by: WatchGuard Technologies, Inc.

    In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Nine Types of Cyber Threats and How to Stop Them

    Sponsored by: Solarwinds MSP

    Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: SingTel

    Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.

  • Simplify Access Management With An Integrated Platform For Web and Cloud Computing

    Sponsored by: IBM

    In this white paper, discover how you can take back control of your access management with a single modular platform which monitors web, mobile, and cloud-based applications.

  • Cybersecurity: Shift from a Position of Acknowledgement to Leadership

    Sponsored by: SingTel

    Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.

  • 2017 Security Protection: 7 Threat Predictions

    Sponsored by: WatchGuard Technologies, Inc.

    Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.