ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Enterprise Mobile Management

    Sponsored by: IBM MaaS360

    Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.

  • Connected Manufacturing Ushers in Expanded, Digital Ecosystem

    Sponsored by: Hewlett-Packard Enterprise

    With the added complexity of the Internet of Things, how can you maintain visibility and control over your supply chains? Discover the biggest challenges and opportunities posed by connected manufacturing, including areas like customer data management, security, mobility, and analytics.

  • The Digital Workplace

    Sponsored by: Aruba Networks

    Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.

  • Endpoint security controls

    Sponsored by: SearchSecurity.com

    Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.

  • Definitive Guide: Securing The Mobile Enterprise

    Sponsored by: Aruba Networks

    Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Where Network Virtualization Fits Into Data Center Initiatives

    Sponsored by: VMware

    Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.

  • What You Want To Know (But Haven’t Asked) About Micro-Segmentation

    Sponsored by: VMware

    Perimeter security is no longer enough to meet data center security requirements. Micro-segmentation is an important security aspect that you need to fully understand. Explore this technical brief to learn about facets of micro-segmentation that many resources don't cover.

  • The Zero Trust data center in action

    Sponsored by: VMware

    Micro-segmentation is the key to securing your data center from the inside out. Read on to learn more about how micro-segmentation works, how to incorporate it, the role network virtualization plays and the benefits it brings.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud

    Sponsored by: Unisys

    Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • How Mobility Gives Small Businesses an Edge with Customers

    Sponsored by: CDW

    What's the easiest way for small and medium-sized businesses (SMBs) to compete with larger ones? Plan out a smart mobility strategy that allows for more efficient internal operations and better customer engagement. Read on to learn how to lay out the best possible strategy for your SMB.

  • Why Traditional Data and Network Security is Not Good Enough

    Sponsored by: Unisys

    Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Small Business Tech Trends: How to Increase Efficiency and Cut Costs

    Sponsored by: CDW

    For small businesses, it can be tough to balance day-to-day operations with keeping up with the latest tech trends. Explore the latest small business trends in IT services, mobility, security, and the cloud. Discover what your peers are doing to increase efficiency, cut costs, and stay ahead of the competition.

  • Flipping the Economics of Attacks

    Sponsored by: Palo Alto Networks

    Discover the results of this independent study of over 300 security experts on the topic of building a security plan with the bottom line in mind. You'll discover the most economical way to prevent your enterprise from falling victim to attack.

  • Managed IT Services Can Help Small Businesses Boost Productivity

    Sponsored by: CDW

    IT workers are spending their days performing routine tasks. What if they were able to focus their efforts on solving business problems instead? Read on to learn how managed IT services will free your IT team to work more strategically and five keys to look for when choosing a service.

  • How Ransomware Works

    Sponsored by: LogRhythm, Inc.

    Explore what ransomeware is, and the 5 stages of a ransomware attack so that you can prepare for the reality of this growing threat.

  • Jump start mobile productivity with MDM and secure file sharing

    Sponsored by: Citrix

    Mobile device management is only a piece of the mobility puzzle. With mobile workers' demands rising, it is hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.

  • The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late

    Sponsored by: LogRhythm, Inc.

    Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one, including: prepare with various security measures, focus on detection, be ready for containment, and 2 more.

  • Achieve a New Level of Security in Healthcare

    Sponsored by: Symantec Corporation

    Uncover the key features your security strategy should include, such as protection of patient information from advanced attacks, secure access to data and applications, reduced risk for regulatory compliance, and more.

  • Safeguard Protected Health Information

    Sponsored by: Citrix

    Securing protected health information is a major priority for healthcare organizations and a major challenge since file sharing is such an important aspect of the industry. Learn about a secure file sharing solution that prevents information leaks while increasing productivity and collaboration.

  • Easing IT migration

    Sponsored by: Citrix

    Operating system (OS) migration is a complex, daunting task. This white paper will act as your guide to a successful migration, exploring the challenges you'll face and a solution that will make the process easier.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.