ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • Banca Carige unlocks the growth potential of big data

    Sponsored by: IBM

    In this case study, learn how a major international bank harnessed the power of big data to gain valuable customer insights. Explore what technology they leveraged, strategies they implemented to access previously untapped business opportunities, and the biggest benefits they received from their new initiatives.

  • The Impact of Big Data, Mobile, Customer Expectations and Cloud on Analytics

    Sponsored by: IBM

    Big data, mobility and cloud computing are all part of a major shift in analytics, forcing the need for a new approach. Read on to learn about today's requirements for business-critical analytics.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

  • BYOD Mobile Device Management

    Sponsored by: IBM

    Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.

  • Mobile Threat Management

    Sponsored by: IBM

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.

  • BYOD Cross-Platform Security: Protecting Enterprise Data

    Sponsored by: IBM

    In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.

  • Privacy Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Discover the questions that every cloud user should be asking their providers. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how they actually handle data security and privacy, don't assume each provider hold the same terms and conditions, and more.

  • What's Driving Desktop Virtualization Adoption?

    Sponsored by: Citrix

    IT admins usually list several reasons why they use desktop and application virtualization, but one thing they can almost all agree on is that these technologies simplify management. This e-guide reveals the top four drivers behind desktop virtualization adoption and discusses the differences between desktop and server virtualization.

  • Securing virtual desktop infrastructure with NetScaler

    Sponsored by: Citrix

    Migrating to virtual desktop technologies is a key initiative for many enterprises due to the benefits the technology has to offer. However, in order to realize the desktop and data security benefits of virtual apps and desktops, it's critical to make sure that the VDI is secure. Read on to learn about taking advantage of the benefits VDI offers.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • QRadar SIEM

    Sponsored by: IBM

    Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.

  • Why Businesses Are Adopting Network Virtualization

    Sponsored by: VMware

    It only takes one objective to make the move to network virtualization worth your while. But what's it mean for IT organizations? Explore the advantages and benefits that make network virtualization attractive to IT organizations and identify how it might suit your business scenario.

  • Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence

    Sponsored by: IBM

    With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting

    Sponsored by: Proofpoint, Inc.

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • How Tech-Savvy Workers are Affecting Enterprise Security

    Sponsored by: Unisys

    Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.

  • 2016 Next-gen Infrastructure Security Report

    Sponsored by: Illumio

    The modern cybersecurity landscape is changing, how far are you willing to go to stay safe? This 2016 Next-gen Infrastructure Security Report will provide an overview of technology focusing on cloud and the challenges emerging with the software-defined anything (SDx) infrastructure.

  • Cybersecurity as a Growth Advantage

    Sponsored by: Cisco

    Don't stifle your innovation potential. Join the discussion on how cybersecurity plays a role in our current economy, threats to be aware of, and the business benefits it enables.

  • Consolidate your Secure Remote Access Delivery Infrastructure with One URL

    Sponsored by: Citrix

    Many enterprises are experiencing fragmented secure remote access infrastructure primarily characterized by multiple URLs. This is creating inconsistent and poor access experiences for employees and users. Read on to discover a next-generation secure remote access solution that addresses these issues, particularly those dealing with mobility.

  • The State of Dynamic Data Center and Cloud Security in the Modern Enterprise

    Sponsored by: Illumio

    In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.