ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

  • 10 Characteristics of a HIPAA-Compliant ePHI Application

    Sponsored by: Coalfire

    The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.

  • Middle East IT Priorities Report 2016

    Sponsored by: ComputerWeekly.com

    Computer Weekly’s in-depth study of IT spending priorities in the Middle East will help you benchmark your business spending in areas such as networking, datacentres and security.

  • Tackling Workplace Mobility

    Sponsored by: VMware

    84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.

  • Mobilize Your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.

  • Public or Private, Instances in the Cloud Need Protection

    Sponsored by: Unisys

    Explore capabilities that conceal your instances in both private and public cloud environments.

  • Enterprise Mobility Management

    Sponsored by: IBM MaaS360

    20% of CIOs reported that their organizations do not have a mobile technology strategy. In order to survive in the mobile centric world, a nuanced strategy is in order. See how enterprise mobility management has evolved over the past two decades and how to ensure that your organization doesn't fall behind.

  • Enable Better Decisions for Everyone in Your Organization

    Sponsored by: Pyramid Analytics

    Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.

  • UK IT Priorities Report 2016

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans with our in-depth study of IT spending priorities from across the UK.

  • SDN network security: Building a safer architecture

    Sponsored by: VMware

    As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Software-defined networking (SDN) technology enables networks to better secure themselves and provide capabilities to enhance the network's ability to identify and remediate cyberattacks.

  • Read this before attempting network microsegmentation

    Sponsored by: VMware

    Microsegmentation is emerging as an essential networking, data center and security tool, but it's a difficult tool to master. This expert guide reveals the technology's benefits and disadvantages, considerations to take into account during the adoption process and what kind of services vendors are offering.

  • Smarter Workspace Management: The IT Service Manager‘s Guide

    Sponsored by: Matrix42

    IT service managers are tasked with providing effective service with limited vision and tight budget constraints. Uncover a solution that centralizes workspace management and provides the necessary vision and infrastructure without breaking the bank.

  • Scaling Security Alongside Your Business Growth

    Sponsored by: Verizon

    See how you can extend your WAN while you grow, and do so without being concerned about opening up your enterprise to unseen vulnerability.

  • Cloud Security: Advanced, Efficient, and Trusted

    Sponsored by: Unisys

    Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.

  • How One Security Expert is Exploring Modern Threats to Enterprises

    Sponsored by: Check Point Software Technologies Ltd.

    Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.

  • Governing the Complications of Social Media Security and Compliance

    Sponsored by: Actiance

    In this exclusive e-guide, technology law expert Jeffrey Ritter discusses the obstacles of governing social media security in 21st century business and what you can do to protect sensitive company information.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Application Awareness: The Critical Enabler in Virtualized Networks

    Sponsored by: Ipoque

    Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.

  • E-Waste Is More Than Just Clutter – It’s A Security Issue

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Enterprise Mobile Management

    Sponsored by: IBM MaaS360

    Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.

  • Connected Manufacturing Ushers in Expanded, Digital Ecosystem

    Sponsored by: Hewlett-Packard Enterprise

    With the added complexity of the Internet of Things, how can you maintain visibility and control over your supply chains? Discover the biggest challenges and opportunities posed by connected manufacturing, including areas like customer data management, security, mobility, and analytics.

  • The Digital Workplace

    Sponsored by: Aruba Networks

    Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.

  • Endpoint security controls

    Sponsored by: SearchSecurity.com

    Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.

  • Definitive Guide: Securing The Mobile Enterprise

    Sponsored by: Aruba Networks

    Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.