ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Endpoint Security - Market Quadrant 2016

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.

  • 6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments

    Sponsored by: Alert Logic

    In this e-book, uncover the challenges of achieving continuous PCI DSS compliance across complex multi-cloud landscapes and the 6 criteria to consider when evaluating compliance solutions.

  • Amazon Web Services: Risk and Compliance

    Sponsored by: Amazon Web Services

    Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.

  • How Apache Software Foundation Streamlined Code-Signing and Managed SSL Certificates

    Sponsored by: Symantec

    In this case study, discover how the Apache Software Foundation was able to streamline cloud-based code-signing for 350 products and 4,000 developers and more effectively manage SSL certificates for its servers.

  • AWS Security Checklist

    Sponsored by: Amazon Web Services

    Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.

  • Overview of AWS Security - Network Security

    Sponsored by: Amazon Web Services

    Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.

  • Enhance Your Security & Compliance for Amazon Web Services

    Sponsored by: CloudPassage

    As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.

  • Lockheed Martin Case Study

    Sponsored by: Amazon Web Services

    Read this case study to learn why Lockheed Martin, an aerospace and defense systems developer for the U.S. military, chose AWS to test its largest and most complex test and development system in the cloud.

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.

  • Overview of AWS Security - Analytics Services, Mobile and Applications Services

    Sponsored by: Amazon Web Services

    Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.

  • Overview of AWS Security: Compute Services

    Sponsored by: Amazon Web Services

    AWS has focused on building security into every layer of their infrastructure, as well as each available service. Access this white paper for an overview of the security AWS provides for their services and how they provide extensive security features to enable you to protect sensitive data and applications.

  • Overview of AWS Security: Database Services

    Sponsored by: Amazon Web Services

    While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.

  • Security at Scale: Governance in AWS

    Sponsored by: Amazon Web Services

    Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.

  • Security at Scale: Logging in AWS

    Sponsored by: Amazon Web Services

    The logging and monitoring of API calls in the AWS cloud are key components in security and operational best practices, as well as requirements for industry and regulatory compliance. This white paper explores how to achieve compliance in AWS with common logging requirements.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • Three Reasons a Secure Web Gateway is Vital for your Security Stance

    Sponsored by: Symantec & Blue Coat Systems

    According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • 8 Benefits of SSL/TLS Automation

    Sponsored by: Symantec

    In this resource, discover the 8 benefits of SSL/TLS automation to better manage certificate renewals and installations.

  • A Solution for Managing Privileged Access

    Sponsored by: Devolutions

    For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.

  • A Practical Guide for GDPR Compliance

    Sponsored by: Smarsh

    GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.

  • The Human Factor 2017

    Sponsored by: Proofpoint, Inc.

    90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.

  • Better Security for Better Business

    Sponsored by: Dell India

    In this infographic learn how to use your security system not only to protect your data but to empower the future of your company by balancing protection, with compliance and enablement.

  • Turning the Tide Against Ransomware

    Sponsored by: Proofpoint, Inc.

    WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.