ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Secure the App, Not the Device. Accelerate the Benefits of Mobility

    Sponsored by: Blue Cedar

    Open up this solution brief to learn about the current state of mobile security, and how the app, not the device became the center for security operations. Then, learn about a new way to inject security code into pre-existing app without disrupting the user experience.

  • Malware Review Q1 2017

    Sponsored by: PhishMe

    Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.

  • Secure Your Data and Meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    Every company that takes card payments needs to comply with PCI DSS v3.1, and the requirements can get complicated quickly. Learn how to kill two birds with one stone and secure your organization while setting yourself up to comply with PCI DSS v3.1 requirements.

  • 11 Policies to Keep Your Apps Secure

    Sponsored by: Blue Cedar

    This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.

  • Report: Your Guide to Today's Threat Landscape

    Sponsored by: Symantec & Blue Coat Systems

    Uncover 6 threats to your organization and how they have evolved over the past year, what specific dangers they pose to your enterprise, and what you can do to mitigate their harm.

  • 10 Benefits to Help Combat Ransomware

    Sponsored by: Symantec & Blue Coat Systems

    Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.

  • Advantage of a Fabric vs. Platform Approach to Enterprise Security

    Sponsored by: Fortinet, Inc.

    This white paper seeks to outline in easy-to-understand language, the real difference between security fabrics and security platforms, each of which claims to be the next-generation in security architecture.

  • Security Ops: How Your Peers are Facing the Threat Landscape

    Sponsored by: Splunk

    Discover the current state of security operations and how your peers around the globe are responding to security incidents of all sizes and types, and why it might seem like a losing battle.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Top Reasons to Choose Dell EMC Data Protection Over HPE

    Sponsored by: Dell EMC and Intel®

    Find out how to achieve truly scalable, cost-effective data protection and backup. Plus, discover 8 reasons to consider Dell EMC data protection when building your strategy for securing data in cloud and virtual environments.

  • Navigating The Evolving Threat Landscape with Network Security

    Sponsored by: TrendMicro

    Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.

  • Internet and Security Threat Report 2017

    Sponsored by: Symantec & Blue Coat Systems

    Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.

  • Analyzing the Malware Threat

    Sponsored by: Symantec & Blue Coat Systems

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

  • Enterprise Phishing Susceptibility and Resiliency Report

    Sponsored by: PhishMe

    Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.

  • Security Delivery Platforms for Dummies

    Sponsored by: Gigamon

    Access this for dummies e-book to discover how a security delivery platform can eliminate network blind spots, optimize security tool performance and scalability and resolve conflict between network and security ops.

  • Information Protection in the Web and Cloud Era

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.

  • Successful Data Center Consolidation

    Sponsored by: BDNA

    Data center consolodation is starting to become a priority for organizations with multiple data centers. Access this white paper to learn about the challenges you face, how to approach your strategy, and why clean asset information is the key to data center consolodation.

  • Data Protection: 6 Attributes to Consider

    Sponsored by: Dell EMC and Intel®

    Uncover 6 attributes the Dell EMC Data Protection Suite has that you can leverage to give your organization a cloud-enabled ability to comprehensively protect its data anywhere.

  • The State of Endpoint Security: Approaches, Opportunities and Conclusions

    Sponsored by: TrendMicro

    Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.

  • Delivering A Consumer-Simple, Enterprise-Secure Mobile Experience

    Sponsored by: VMware

    Access this infographic to find out how mobility and BYOD are changing the enterprise as much as the introduction of the Internet did.

  • Your Guide to Combating Phishing in 2017

    Sponsored by: PhishMe

    To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.

  • Data Breaches and the Great Security Disconnect

    Sponsored by: PhishMe

    Access this infographic now to learn how to bolster your existing security measures with tools that address growing cyberthreats and empower your employees to be part of the solution.

  • 7 Questions to Ask Before Choosing a Threat Intelligence Feed for Web-Based Threats

    Sponsored by: The Media Trust

    Learn 7 questions that you need to ask of your threat intelligence feed to determine what's best for your enterprise's security, what makes a truly valuable threat intelligence feed, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.