ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Gain Complete Control of Your Digital Ecosystem with PKI

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Technology, media and telecommunications predictions 2017

    Sponsored by: ComputerWeekly.com

    Deloitte predicts the key trends in technology, media and telecommunications in 2017

  • The 5 Rings of Data Integration Hell

    Sponsored by: Globalscape

    In this guide, discover the 5 "rings of hell" that make meeting data integration requirements difficult. In addition learn about the various scenarios which can cause data integration challenges, various methods for data migration worth considering, and more.

  • Information Security magazine Insider Edition, January 2017

    Sponsored by: SearchSecurity.com

    Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing.

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • IT Security 101: Think Like A Cybercriminal

    Sponsored by: Solarwinds MSP

    In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.

  • 7 Ways To Make Yourself Hard To Hack

    Sponsored by: Solarwinds MSP

    Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.

  • School District Ensures Data Protection with Network Security Appliance

    Sponsored by: WatchGuard Technologies, Inc.

    One school district, with over 1,200 students and 400 staff members, needed to protect confidential data, remain compliant with CIPA (Children's Internet Protection Act) and improve visibility and control over web applications. In this case study, learn how the school was able to meet their needs with one advanced, network security appliance.

  • Secure, Cloud-Managed Wifi

    Sponsored by: WatchGuard Technologies, Inc.

    In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Nine Types of Cyber Threats and How to Stop Them

    Sponsored by: Solarwinds MSP

    Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: SingTel

    Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.

  • Simplify Access Management With An Integrated Platform For Web and Cloud Computing

    Sponsored by: IBM

    In this white paper, discover how you can take back control of your access management with a single modular platform which monitors web, mobile, and cloud-based applications.

  • Cybersecurity: Shift from a Position of Acknowledgement to Leadership

    Sponsored by: SingTel

    Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.

  • 2017 Security Protection: 7 Threat Predictions

    Sponsored by: WatchGuard Technologies, Inc.

    Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • What to Consider When Looking for Cloud-powered Data Protection

    Sponsored by: Carbonite

    Gain more control over costs by leveraging the cloud. Download this white paper for a list of key factors and capabilities to consider when investigating cloud-powered data protection.

  • Waking Up From The Ransomware Nightmare

    Sponsored by: QuorumLabs Inc.

    This white paper describes how ransomware attacks are on the rise, and how BDR is the real ransomware solution. Included in the white paper are 5 steps to taking control of your ransomware attack.

  • Mobile: Enhanced Security, Consistent Management, Open Framework

    Sponsored by: SOTI Inc.

    Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program. Read on to find challenges to both strategies, what benefits can be reaped from this approach, and more.

  • How to Address IoT, Mobile, and Endpoint Security Challenges

    Sponsored by: SOTI Inc.

    This white paper examines the security challenges of IoT and how they affect mobile strategies. Discover how to go beyond unified endpoint management (UEM), address issues of interoperability, and more.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell, Inc. & Intel®

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Five Mobile Security Myths Debunked

    Sponsored by: SingTel

    Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.

  • Security for the Future-Ready Workforce

    Sponsored by: Dell, Inc. & Intel®

    To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.