ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks

    Sponsored by: Citrix

    Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.

  • Healthcare Cybersecurity Best Practices

    Sponsored by: ServiceNow

    In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.

  • The State of Incident Response

    Sponsored by: ServiceNow

    Take a close-up look at the current practices and challenges associated with incident response processes and technologies. Browse through tips from IT leaders to guide your security framework.

  • Redefining the Mission of Mobile Authentication

    Sponsored by: Aruba Networks

    Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.

  • Empower a Mobile Workforce with Secure App Delivery

    Sponsored by: Citrix

    As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.

  • Secure App and Data Delivery – Across Devices, Networks, and Locations

    Sponsored by: Citrix

    Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.

  • Empowering Mobile Security with Policy Management

    Sponsored by: Aruba Networks

    Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rules associated with legacy authentication, authorization and accounting.

  • Gain Capabilities to help you Protect, and Insight to Understand

    Sponsored by: Check Point Software Technologies Ltd.

    As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.

  • Best Practices for Strong Cyber Security

    Sponsored by: Hewlett Packard Enterprise

    Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.

  • Behind the Mask: The Changing Face of Hacking

    Sponsored by: Hewlett Packard Enterprise

    This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.

  • Companies Cautiously Optimistic about Cybersecurity

    Sponsored by: Hewlett Packard Enterprise

    This white paper examines the realistic possibilities of your business experiencing an attack and what you can do to prepare your network.

  • SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring

    Sponsored by: Hewlett Packard Enterprise

    Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.

  • Cyber Risk Report 2016 Executive Summary

    Sponsored by: Hewlett Packard Enterprise

    In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.

  • Few Fully Prepared for Software Security Risks

    Sponsored by: Hewlett Packard Enterprise

    This white paper shows you results from a recent security survey and the value of testing your security measure regularly.

  • The Global Cost of Cyber Crime

    Sponsored by: Hewlett Packard Enterprise

    Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.

  • What to Look for in Next-Generation Firewalls

    Sponsored by: SearchSecurity.com

    This Buyer's Guide explains the process of selecting the best next-generation firewall for your company.

  • Data protection and security incident response when all information is a target

    Sponsored by: Intel

    In the face of sophisticated cyberattacks, companies have been forced to escalate cybersecurity risk management tactics and strategies beyond traditional (i.e. outdated) methods. This vendor-neutral guide provides the benefits and steps to developing better methods for identifying imminent cyberattacks and preventing breaches before it's too late.

  • A Security Delivery Platform Benefits the Entire Organization

    Sponsored by: Gigamon

    As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.

  • How to Reduce Cost While Securing your Operations

    Sponsored by: Verizon

    See how a media company came to have a network that was more secure than ever, while lowering their overall costs. It's desirable but difficult to have a fast, reliable, and secure network infrastructure – but it can be done.

  • Security Threats Facing Technology Companies

    Sponsored by: Verizon

    This report reveals the 3 top IT security threats facing technology companies in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.

  • IT Security Threats Facing Retail in 2016

    Sponsored by: Verizon

    This report reveals the 3 top IT security threats facing retail businesses in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.

  • Three Key Considerations in Securing the Software-Defined Data Center (SDDC)

    Sponsored by: Intel Security

    The deployment of proven technologies to protect private or hybrid cloud environment and/or a software-defined data center (SDDC) is vital. Discover three critical steps that enterprises can adopt and adhere to ensure both data and the data center are protected from both internal/external threats.

  • A Unified View of the Enterprise Network for Proactive Security

    Sponsored by: Fortinet, Inc.

    Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • How to Prevent Healthcare Cybersecurity Attacks

    Sponsored by: ServiceNow

    In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.