ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • ShareFile Enterprise Security White Paper

    Sponsored by: Citrix

    Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

  • Operationalizing Threat Intelligence

    Sponsored by: Intel Security

    Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.

  • Enhancing ATA Remediation: Monitor Continuously, Respond Swiftly

    Sponsored by: Intel Security

    Discover why endpoint detection and response (EDR) should be an indispensable supplement to your current defenses. Learn how to transform your team from an incident response mentality to one of continuous monitoring and equip yourself against zero-day and advanced targeted attacks.

  • Small Businesses Must Heed Cloud, Security, Mobility and IT Services Trends in 2016

    Sponsored by: CDW

    Four major digitally disruptive trends will reshape small businesses over the next few years: cloud computing, security, mobility, and managed IT services. Discover the biggest benefits and challenges posed by these technologies and learn how you can increase operational performance, decrease risk, cut costs, and adopt innovation faster.

  • A Seamless Path to the Hybrid Cloud

    Sponsored by: F5 Networks

    Explore how you can couple Microsoft Azure's public cloud environment with secure networking controls to transition seamlessly to hybrid cloud. Learn about the security and networking benefits, and delve into several use case scenarios for deployment.

  • McAfee Labs Threats Report

    Sponsored by: Intel Security

    Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Considerations for Secure Enterprise File Sharing

    Sponsored by: Citrix

    File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.

  • Micro-Segmentation Builds Security Into Your Data Center’s DNA

    Sponsored by: VMware

    Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.

  • Future of IT Infrastructure

    Sponsored by: Verizon

    Digital is changing the way that most aspects of business are being handled. Instead of worrying about protocols and lead times, your IT function should be focusing on creating the right business rules. Learn more about the latest intelligent networking solutions offering greater visibility and control.

  • Maturing and Specializing: Incident Response Capabilities Needed

    Sponsored by: Intel Security

    View global survey results (direct from the expert analysts at The SANS Institute) on current incident response strategies and tools employed by your peers so you can best grasp successful 2016 incident response essentials.

  • Leveraging Threat Intelligence In Incident Response

    Sponsored by: Intel Security

    The ultimate goal of any incident management process is to contain the damage of attacks. This requires you to investigate and find the root causes of attacks faster. How? Find out how to more effectively safeguard your network from attack, monitor for indicators of compromise, and streamline your response if an attack is (inevitably) successful.

  • A Cloud Security Primer

    Sponsored by: Intel Security

    With different cloud models available (public, private, hybrid) there's a lot of confusion around how to secure them and what methods work best for each model. No matter how far along you are with the cloud or how simple or complex your cloud deployment, access this white paper now so you can proactively prepare to repel inevitable attacks.

  • Emergency Incident Response: 10 Common Mistakes of Incident Responders

    Sponsored by: Intel Security

    Understand the top 10 common emergency incident response mistakes that organizations commonly make and how you can avoid making the same ones. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are tested, effective and secure.

  • The 5 Characteristics of an Intelligence-Driven Security Operations Center

    Sponsored by: Intel Security

    Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.

  • The What, the Why, and the How of Hybrid Cloud

    Sponsored by: Intel Security

    Many of us have come to think of The Cloud as referring to public or private clouds. However, hybrid cloud means not having to choose. Access this comprehensive white paper to learn about what hybrid clouds really are, the top five business benefits of the hybrid cloud, and 14 reasons why you should re-think going the public cloud route altogether.

  • Think Like an Attacker: Six Steps Toward Better Security

    Sponsored by: Intel Security

    Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.

  • Building Resilience in a Digital Enterprise: Transforming From Compliance to Risk Management

    Sponsored by: Intel Security

    Discover how to create a path to sustained resiliency in your security infrastructure so you can repel advanced, modern threats while ensuring rock-solid compliance. How? Only by building resiliency into your security operations will you be ready to immediately thwart sophisticated attacks targeted.

  • Security that Plays Well with Others

    Sponsored by: Intel Security

    As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.

  • Securosis: SIEM Kung Fu

    Sponsored by: Intel Security

    Learn how to make the most of your existing security information and event management (SIEM) product or service as we reveal real-world use cases as to why SIEM still matters (although no longer requires a ninja DBA to help with it) and how your current security monitoring platform can be leveraged to enable faster detection and prevention.

  • ESG Lab Validation Report: McAfee Next Generation SIEM

    Sponsored by: Intel Security

    Access this ESG lab validation report to discover unbiased answers and expertise as to how a holistic security approach, which can leverage multiple interconnected security solutions as a unified ecosystem, might be the answer to today's frustrating IT security dilemmas.

  • Blue Skies Ahead? The State of Cloud Adoption

    Sponsored by: Intel Security

    IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.

  • Understanding Cyberthreat Motivations to Improve Defense

    Sponsored by: Intel Security

    Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.

  • Top Strategies to Automate Across Your Enterprise Network

    Sponsored by: Juniper Networks, Inc.

    The cloud is forcing IT decision-makers to re-evaluate how they deploy their networks to ensure the best security and efficiency. Attackers know the cloud is their next big target. Access this white paper to learn how to deal with the threat landscape and drive business forward while reducing operating costs.

  • Outsource IT Services While Maintaining Control and Transparency

    Sponsored by: Juniper Networks, Inc.

    Find advice on how to choose the right service providers – and avoid the worst ones – for IT security and support in this expert e-guide.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.