ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • What You Need to Know About the General Data Protection Regulation (GDPR)

    Sponsored by: Rapid7

    In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.

  • Data + Security = A Most Unvirtuous Relationship

    Sponsored by: Delphix

    Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.

  • Introducing Smart Check and Citrix Smart Tools

    Sponsored by: Citrix

    If you run XenApp and XenDesktop sites, you understand the importance of keeping them both secure and up-to-date. This five minute video demonstrates how to proactively diagnose and repair issues as they arise rather than waiting for them to cause significant issues.

  • How to Secure your Network Smarter and Faster

    Sponsored by: Juniper Networks, Inc.

    In this resource, learn about Junos Space Security Director. It's a solution that allows network administrators to monitor applications and users and remediate security threats faster across all firewalls.

  • Achieve SIEM Solution Success

    Sponsored by: Rapid 7

    Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

  • Hyland Ensures Growth with High-Performance, Intelligent Network Security

    Sponsored by: Juniper Networks, Inc.

    In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.

  • All Together Now: Securing the Internet of Things

    Sponsored by: Juniper Networks, Inc.

    In this white paper, learn how deeper visibility into network utilization and behavior from IOT devices can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.

  • Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive

    Sponsored by: Juniper Networks, Inc.

    In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way.

  • Next-Generation Firewalls: The Cornerstone of Future Security

    Sponsored by: Palo Alto Networks

    Learn about one next-gen firewall that combines network, cloud and endpoint security capabilities, and enables them all with threat intelligence to help prevent cyber breaches. Read on to find 6 key abilities of this strategy.

  • IP Surveillance Solutions that Connect Businesses to More Peace of Mind

    Sponsored by: D-Link

    In this solution brief, learn how to make the transition to IP surveillance and how network switches ease integration. Then, uncover the benefits of IP surveillance cameras including improved image quality and reliability.

  • Damage Control: The Impact of Critical IT Incidents

    Sponsored by: Splunk

    IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.

  • Delivering Fortinet Security to AWS GovCloud Customers

    Sponsored by: AWS - Fortinet

    In this resource, uncover the 6 virtual security products optimized for AWS to help your organization with a secure and future-proof transition to a cloud environment.

  • Automated, Unified Security for your Entire IT Environment

    Sponsored by: AWS - Fortinet

    Whether your data and applications are living in the cloud, hybrid or private cloud environment, it is key to protect your entire environment from today's threats. Find out how.

  • Protecting the Financial Services Organization

    Sponsored by: Juniper Networks, Inc.

    Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.

  • Amazon Web Services: Automatically Scale Cloud Security

    Sponsored by: AWS - Fortinet

    This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.

  • Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud

    Sponsored by: AWS - Fortinet

    Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.

  • Case Study: Network Performance and Security Efforts Take Off at Pangborn Memorial Airport

    Sponsored by: D-Link

    This case study explores how Pangborn Memorial Airport leveraged D-Link's 7100 Cloud cameras to upgrade their network infrastructure to accommodate the growth and support of new IP-based technologies to achieve more network speed, security and uptime.

  • Magic Quadrant for Enterprise Information Archiving

    Sponsored by: Proofpoint, Inc.

    Compliance, discovery and preservation are key drivers of the enterprise information archiving market. This Gartner report reveals strengths and cautions of different vendor's enterprise information archiving products as well as a market overview.

  • The GDPR Compliance Checklist

    Sponsored by: Citrix

    The General Data Protection Regulation (GDPR) will be effective on May 25, 2018. Download this checklist to see what your organisation needs to do to stay ahead of the GDPR.

  • Design and deliver cloud-based apps and data for flexible, on-demand IT

    Sponsored by: Citrix

    Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.

  • Bots Mean Business

    Sponsored by: F5 Networks

    While some bots are good, many are malicious and the cybercriminals behind them are targeting your apps. This e-book explores how to optimize business intelligence while protecting your enterprise's apps, network, and data.

  • Seamless Hybrid Cloud Security is Critical for VMware Cloud on AWS

    Sponsored by: AWS - Fortinet

    Despite the popularity of combining public and private clouds, there are unique security factors to consider in mixed cloud environments. Read on to explore in-depth advice and insights on three key areas you need to address when it comes to hybrid cloud security.

  • Busting the Myth of the Malware "Silver Bullet"

    Sponsored by: McAfee, Inc.

    Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.

  • 5 Ways Virtualization Enhances Security and Productivity

    Sponsored by: Citrix

    Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.