ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • How Cloud Services Giant Exostar Protected Sensitive Data and Applications

    Sponsored by: VMware, Inc.

    In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.

  • 9 Best Practices to Build a Digital Business Architecture

    Sponsored by: Axway

    APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover in this extensive report the current state of hybrid cloud security and compliance, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure.

  • Automation in Network Security Management: Friend or Foe?

    Sponsored by: Palo Alto Networks

    Tune in to learn the pros and cons of network security management automation, and how you can automate your processes for threat analysis and network management.

  • Make Micro-segmentation Work for Your Network: A Collection of Customer Stories

    Sponsored by: VMware, Inc.

    Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.

  • IoT Security: Have You Addressed These 10 Critical Issues?

    Sponsored by: Axway

    Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Seize The Data: Reduce your risk

    Sponsored by: Hewlett-Packard Enterprise

    Learn how one healthcare provider was able to identify, investigate and resolve security issues before they became an issue. Download now to discover what software helped them along the way.

  • Defending Hybrid Enterprises from Data Breaches and Insider Threats

    Sponsored by: CA Technologies

    Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.

  • Using Splunk to Manage AWS: Gaining Transparency into Cloud Computing

    Sponsored by: Splunk

    This webcast explores how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with an identity access management feature along with a data management platform to improve the security of their data. Watch now to find out how they were able to reduce costs of their infrastructure.

  • Enhancing Security and System Functionality with the Cloud

    Sponsored by: Splunk

    This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering tens of thousands in operational costs and reducing time resolution for errors.

  • Unified Endpoint Management, Enabling the Workspace

    Sponsored by: MicroFocus

    This resource details an end-to-end management and protection suite designed to manage your users' workspaces, no matter whether the environment is physical, virtual, or cloud. Access now and you'll learn about the technical specifications and features of this suite.

  • Guide to Flexible Working

    Sponsored by: ComputerWeekly.com

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

  • Cloud Computing and Banking: Combatting ATM Fraud

    Sponsored by: Splunk

    In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.

  • Cybersecurity Buyer's Guide

    Sponsored by: Palo Alto Networks

    This white paper provides guidance on choosing the right cybersecurity solution for your organization. If you are looking for a new tool, discover 10 things your solution must do, and a checklist that you can use to make your decision.

  • Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential

    Sponsored by: LogicNow

    This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.

  • The Economics of Enterprise Data Protection on Cost and Scalability

    Sponsored by: Sempre Technologies Ltd

    In this e-guide, experts reveal top tips for rising organizations' data protection needs. Uncover cost and scalability considerations for your data protection purchasing phase, as well as the economic impact of data protection in the enterprise.

  • 7 Things You Need to Know about Virtual Mobile Infrastructure

    Sponsored by: Sierraware

    Trends like BYOD have forced IT departments tochange the way that they manage and secure endpoints. IT must rethink the way that they monitor andprotect business data, while still allowing users toaccess vital business applications. Access this white paper to learn seven keys to managing BYOD with virtual mobile infrastructure.

  • Pervasive Security Enabled by Next Generation Monitoring Fabric

    Sponsored by: Big Switch Networks

    As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.

  • Big Monitoring Fabric 5.5

    Sponsored by: Big Switch Networks

    Network security and traffic monitoring are highly important to business. Review this data sheet to see the benefits this product can provide for your business's network.

  • Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work

    Sponsored by: Sierraware

    As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • Computer Weekly – 5 April 2016: Seven steps to digital leadership

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the key characteristics of successful leaders as digital transformation becomes a business priority. We examine Microsoft's plans for exploiting the internet of things. And we look back at British IT history after WW2 as part of Computer Weekly's 50th anniversary celebrations. Read the issue now.

  • Secure Voting

    Sponsored by: ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Into the Breach: Tightening Security in Today’s Healthcare Organization

    Sponsored by: Aventura

    Download this infographic to uncover the key security issues, and the challenges of securing healthcare information today. Learn how you can boost healthcare IT system security with key recommendations.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.