ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • See How Phillip Morris Ramped Up its Mobile Management Across 60 Countries

    Sponsored by: MobileIron

    Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.

  • Five Key Trends That Are Shaping How We Manage Enterprise Content

    Sponsored by: ASG

    The ECM landscape is changing and 5 trends are determining how enterprise architecture (EA) professionals approach new challenges. This Forrester research report analyzes these key ECM trends to help EA pros prioritize content management investments during these changes.

  • Gain Complete Control of Your Digital Ecosystem

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • From DevOps to DevSecOps: Integrating Security

    Sponsored by: BMC

    They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

  • The Virtual Firewall Buyer's Guide

    Sponsored by: Juniper Networks, Inc.

    Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.

  • IT Guide for Mobility: Making the Case to Security Leaders

    Sponsored by: Cisco Systems, Inc.

    Discover how to help IT communicate the value of mobility to key stakeholders on the security team in your organization. Further, learn why partnering with IT is their smartest path to success.

  • Case study: Protecting high-profile clients with resilient network security

    Sponsored by: Forcepoint

    Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.

  • Allow Your Enterprise Greater Mobile App Security

    Sponsored by: MobileIron

    This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.

  • Case study : How the French Ministry of Education strengthens front-end security

    Sponsored by: Forcepoint

    Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.

  • Microsoft Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware, Inc.

    Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.

  • How Swiss Re Created a Safe Mobile First Strategy

    Sponsored by: MobileIron

    This case study explores how Swiss Re implemented a multi-OS enterprise mobility management system, allowing them the security they desired, and employees the freedom to work with their personal devices. Find out how Swiss Re allowed access to the company intranet from any device, developed a "mobile first" strategy, and more.

  • Windows 10, Enterprise Mobility Management, and the Future of PC Security and Management

    Sponsored by: MobileIron

    This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.

  • Can Enterprises Hire Their Way Out of Cloud Security Risks?

    Sponsored by: Palerra Inc.

    This white paper explores the essential question: Can enterprises hire their way out of cloud security risks? As more employees connect their personal devices to your cloud environment, the answer to this question becomes even more crucial. Discover what roles hiring and automation are playing in mitigating cloud security risks.

  • Focusing on Application Security is More Important than Ever

    Sponsored by: Onapsis

    This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.

  • Sky case study

    Sponsored by: MobileIron

    Learn how Sky improved its mobile security and thereby freed its sales staff from the desk, leveraged mobile company apps to improve sales, and kept everything secure even with teams deployed all over Europe.

  • Mobile Malware Hits Active Sync-Only Devices

    Sponsored by: MobileIron

    Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.

  • eBook : Your Guide to Advanced Evasion Techniques

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • Building a Strong Application Security Program

    Sponsored by: Onapsis

    What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.

  • 4 Countermeasures to Protect Against Ransomware

    Sponsored by: TrendMicro

    Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Miercom Report - Cisco Catalyst 3650

    Sponsored by: Cisco Systems, Inc.

    The Cisco Catalyst 3650 is an enterprise access switch – ideal for branch-office deployments. Models in this versatile switch series deliver a spectrum of capabilities. This Miercom report details some of the clear business benefits that the Cisco Catalyst 3650 delivers supported by the results of hands-on testing.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Are You Complacent About Mobile Threats?

    Sponsored by: Lookout

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.