ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Healthcare CIOs Share Cybersecurity Best Practices

    Sponsored by: Symantec Corporation

    Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.

  • The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim

    Sponsored by: Unisys

    Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.

  • THE FIVE NEW RULES TO SECURE DYNAMIC DATA CENTERS AND CLOUDS

    Sponsored by: Illumio

    The current security model for protecting applications in data centers and clouds is broken. We need an approach to security that protects from the inside out, and decouples security from the underlying infrastructure. Discover the 5 new rules to secure dynamic data centers and clouds in this white paper.

  • A Smart Way to Protect Windows Server 2003

    Sponsored by: Unisys

    Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.

  • Lighting a Path to PCI Compliance

    Sponsored by: Illumio

    Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.

  • There's Never Been A Better Time to Worry Less and Innovate More

    Sponsored by: Cisco

    You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc.

    This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • Top 10 Cyber Incident Pain Points: Are You Prepared?

    Sponsored by: Delta Risk

    Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.

  • Boosting Office 365 Security

    Sponsored by: Symantec Corporation

    The aim of a brute-force attack is to gain access to user accounts and steal data by repeatedly trying to guess the password of a user. This e-guide will highlight an Office 365 security feature that will protect your organization from denial-of-service and brute-force password attacks.

  • Connected Medical Devices Meet FDA Scrutiny

    Sponsored by: Symantec Corporation

    Cybersecurity threats to medical devices are a growing concern, particularly in the new era of IoT. Discover the FDA-recommended steps that manufacturers and users of connected medical devices should take to ensure cybersecurity.

  • 2016 Security Buyer's Guide

    Sponsored by: Illumio

    Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.

  • Three Ways Companies are Slashing IT Costs with VDI

    Sponsored by: Citrix

    Find out how VDI helps IT to shift to a centralized architecture in order to lower capital and operating expenses, increase flexibility, and improve security. You'll also explore three organization's experience with using VDI.

  • Modern Adaptive Security

    Sponsored by: Illumio

    Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.

  • Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks

    Sponsored by: Citrix

    Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.

  • Healthcare Cybersecurity Best Practices

    Sponsored by: ServiceNow

    In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.

  • The State of Incident Response

    Sponsored by: ServiceNow

    Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.

  • Redefining the Mission of Mobile Authentication

    Sponsored by: Aruba Networks

    Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.

  • Empower a Mobile Workforce with Secure App Delivery

    Sponsored by: Citrix

    As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.

  • Secure App and Data Delivery – Across Devices, Networks, and Locations

    Sponsored by: Citrix

    Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.

  • Empowering Mobile Security with Policy Management

    Sponsored by: Aruba Networks

    Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rule sets associated with legacy authentication, authorization and accounting.

  • Gain Capabilities to help you Protect, and Insight to Understand

    Sponsored by: Check Point Software Technologies Ltd.

    As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.

  • How to Prevent Healthcare Cybersecurity Attacks

    Sponsored by: ServiceNow

    In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.