ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Finding a Better Metaphor, Staring into the Cloud, and What to Expect at RSA 2017

    Sponsored by: Booz Allen Hamilton

    This white paper explores the security challenges of cloud and IoT, and examines which topics dominated the 2017 RSA conference. Find out which security paradigms are shifting and learn how security pros are putting a new spin on old topics, like how analytics and intelligence are increasing their role in threat and event management.

  • Cyber Threat Analysis For 2017

    Sponsored by: Booz Allen Hamilton

    Access this guide to uncover a number of vital security predictions for 2017, including: enterprise environments providing fertile territory for ransomware operators, how IoT can enable DDoS attacks, and more.

  • Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability

    Sponsored by: Dyn

    Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • Securely Bridge Traditional and Cloud Application Environments

    Sponsored by: A10 Networks

    Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.

  • The Best of Both Worlds: Using a Hybrid Approach to Boost IT Agility

    Sponsored by: HPE and Intel®

    Can't choose between on-premise and cloud infrastructures? Get both. Access this white paper to review the conversation surrounding hybrid IT and how it addresses SMBs' concerns about their current IT infrastructures.

  • Top 5 Requirements for Cloud-Native Application Traffic Management & Security

    Sponsored by: A10 Networks

    Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.

  • Understanding and Overcoming Cloud Security Threats

    Sponsored by: Peak10

    The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.

  • Tackling Insider Threats

    Sponsored by: Intel Security

    Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.

  • 6 Questions Every CIO Should Ask About Cloud Security

    Sponsored by: IBM

    Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • Details on Newly Observed GhostAdmin Botnet

    Sponsored by: Booz Allen Hamilton

    Gain a rare look at the beginnings of a malware threat and learn how Booz Allen Hamilton discovered and identified indicators of compromise for the newly observed GhostAdmin malware and how to protect your enterprise from falling prey to it.

  • How to Eliminate Network Blind Spots in Visibility and Security

    Sponsored by: Ixia

    Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.

  • Simplify and Accelerate Identity Protection on The Cloud

    Sponsored by: IBM

    Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.

  • How Blockchain Analysis was Used to Identify Additional Shifu Infrastructure and Campaign Timeframe

    Sponsored by: Booz Allen Hamilton

    Gain a phenomenal chance to go deep inside a real-world threat intelligence blockchain analysis and discover how Booz Allen Hamilton identified indicators of compromise (IOC) related to a Shifu before it spiraled out of control.

  • WP IFSW Global Network Survey results

    Sponsored by: Fortinet, Inc.

    Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers

  • Evaluating Inline Security Fabric: Key Considerations

    Sponsored by: Ixia

    To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.

  • Understanding What Matters Most When Selecting Managed DNS

    Sponsored by: Dyn

    In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.

  • DataSheet-SecondaryDNS2

    Sponsored by: Dyn

    When DNS underperformance means a dent in revenue, customer satisfaction, and employee productivity, what can you do? Access this white paper to learn how to ensure your most critical applications remain available on the web and that end users reach those applications faster than with any other solution.

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    Sponsored by: ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

  • Fast Breach Mitigation Without Network Disruption

    Sponsored by: Ixia

    With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.

  • Deploying a Multi‐Gigabit Web Filtering Architecture

    Sponsored by: ContentKeeper

    This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.

  • Preventing Ransomware: Healthcare CIO Discusses Top Technologies

    Sponsored by: Cisco

    In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.

  • Use a web app firewall to halt app attacks

    Sponsored by: SearchSecurity.com

    Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.

  • Modernize Cybersecurity with Hadoop Data Management and Analytics

    Sponsored by: Cloudera

    Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.