ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Focus: IT Security in the Middle East

    Sponsored by: ComputerWeekly.com

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

  • Measures to Protect Our Growing Data

    Sponsored by: Pure Storage

    The data deluge has arrived and at any one time, federal agencies will store an average of 2.63 petabytes. Flash storage provides the capacity, performance and cost-effectiveness needed but still leaves the question of security. Read on to learn how governments intend to keep their data safe and secure.

  • Keeping the Keys to Your Cloud Future Secure

    Sponsored by: Entrust, Inc.

    Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Trusted Identities in Digital Business The Benefits of PKI

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.

  • The DNS Global Threat: Your In-Depth Report

    Sponsored by: EfficientIP

    Within this report come to understand not only the technical and business impacts of DNS security, but also why they are underestimated, how businesses should counter them, and how most DNS security solutions are not adapted.

  • See How Phillip Morris Ramped Up its Mobile Management Across 60 Countries

    Sponsored by: MobileIron

    Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.

  • Five Key Trends That Are Shaping How We Manage Enterprise Content

    Sponsored by: ASG

    The ECM landscape is changing and 5 trends are determining how enterprise architecture (EA) professionals approach new challenges. This Forrester research report analyzes these key ECM trends to help EA pros prioritize content management investments during these changes.

  • Gain Complete Control of Your Digital Ecosystem

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • From DevOps to DevSecOps: Integrating Security

    Sponsored by: BMC

    They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

  • The Virtual Firewall Buyer's Guide

    Sponsored by: Juniper Networks, Inc.

    Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.

  • IT Guide for Mobility: Making the Case to Security Leaders

    Sponsored by: Cisco Systems, Inc.

    Discover how to help IT communicate the value of mobility to key stakeholders on the security team in your organization. Further, learn why partnering with IT is their smartest path to success.

  • Case study: Protecting high-profile clients with resilient network security

    Sponsored by: Forcepoint

    Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.

  • Allow Your Enterprise Greater Mobile App Security

    Sponsored by: MobileIron

    This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.

  • Case study : How the French Ministry of Education strengthens front-end security

    Sponsored by: Forcepoint

    Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.

  • Microsoft Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware, Inc.

    Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.

  • How Swiss Re Created a Safe Mobile First Strategy

    Sponsored by: MobileIron

    This case study explores how Swiss Re implemented a multi-OS enterprise mobility management system, allowing them the security they desired, and employees the freedom to work with their personal devices. Find out how Swiss Re allowed access to the company intranet from any device, developed a "mobile first" strategy, and more.

  • Windows 10, EMM, and the Future of PC Security and Management

    Sponsored by: MobileIron

    This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.

  • Can Enterprises Hire Their Way Out of Cloud Security Risks?

    Sponsored by: Palerra Inc.

    This white paper explores the essential question: Can enterprises hire their way out of cloud security risks? As more employees connect their personal devices to your cloud environment, the answer to this question becomes even more crucial. Discover what roles hiring and automation are playing in mitigating cloud security risks.

  • Focusing on Application Security is More Important than Ever

    Sponsored by: Onapsis

    This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.

  • Mobile Malware Hits Active Sync-Only Devices

    Sponsored by: MobileIron

    Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.

  • Sky case study

    Sponsored by: MobileIron

    Learn how Sky improved its mobile security and thereby freed its sales staff from the desk, leveraged mobile company apps to improve sales, and kept everything secure even with teams deployed all over Europe.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.

  • E-Book : Network security guide "Advanced Evasion Techniques for Dummies"

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.