ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Top 5 IoT Security Questions for Manufacturers

    Sponsored by: Microsoft

    The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.

  • Overcome Security And Identity Management Challenges In Enterprise Mobility With The Right IT Infrastructure

    Sponsored by: Microsoft

    Mobility is becoming an increasingly crucial tool in today's business landscape. Access this white paper to uncover the three key findings about risk management, security, and infrastructure that Forrester Research discovered during a study on enterprise mobility.

  • Healthcare Organization Uses IaaS, DRaaS, and DaaS Platforms for Contractor Desktops

    Sponsored by: Cirrity

    This case study reveals how one healthcare organization used a secure cloud service, with IaaS, DRaaS, and DaaS platforms, to support a virtual desktop environment to enable anytime, anywhere, access to systems for contractors all over the world.

  • Wake Up From Device Management Nightmares with User-Centric Approach

    Sponsored by: MicroFocus

    This white paper details how to overcome this challenge by managing devices by the user. Access now to find out how user-centric management strategies gives users anytime, anywhere access, no matter what device they use, while giving IT automated management that eases time-consuming tasks.

  • Next Generation Firewall Test Report

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.

  • Test Report: Breach Detection System

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.

  • Solving the Growing Complexities of Network Management: Network as a Service

    Sponsored by: Rogers Communications, Inc.

    IT teams continue to struggle to keep up with new technologies and increasing bandwidth demands are only worsening the problem. Discover how to shift your IT departments focus from day-to-day maintenance toward productivity with Network as a Service.

  • Security for the Internet of Things: Identifying Your Weakest Links

    Sponsored by: Microsoft

    70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.

  • Cloud-Hosted Desktops: Which Solution Is Right For You?

    Sponsored by: UKFast

    Before you jump into a DaaS or VDI deployment, consult this white paper which details the differences between each strategy and helps you decide which is better suited for your business. You'll gain insight into the following features including, the benefits of cloud-hosted desktops, virtual desktop use cases, and more.

  • Be More Secure With Micro-Segmentation

    Sponsored by: VMware

    This short infographic specifically identifies one way that you can improve security within the confines of your data center. Explore how using micro-segmentation can help create partitions that will prevent attackers from rampaging through your data center.

  • Cyber Risk Report - Year in Review

    Sponsored by: SurfWatch Labs

    This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.

  • Q4 Mobile Security and Risk Review

    Sponsored by: MobileIron

    This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.

  • Credit Union Infographic

    Sponsored by: SurfWatch Labs

    This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.

  • Embracing User-Centric Workspaces with ZENworks

    Sponsored by: MicroFocus

    Access this white paper to learn about a strategy that embraces and enables a user-centric workspace experience by extending five key capabilities to any user, device, and wired or wireless connection.

  • How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations

    Sponsored by: Dell SecureWorks

    This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.

  • Top 5 IT Challenges Facing Canadian Businesses

    Sponsored by: Rogers Communications, Inc.

    Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.

  • Make More Money with Enterprise Mobility Suite Part 1

    Sponsored by: Microsoft

    Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.

  • Rapidly Detect and Respond to the Advanced and Evasive Threat

    Sponsored by: Dell SecureWorks

    This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.

  • National Government Department: Boosting Performance for 3D Graphics Apps with All-Flash Array

    Sponsored by: EMC XtremIO

    This case study uncovers how one national government adopted all-flash array storage to run their VDI and graphics-intensive applications in order to replace expensive dedicated workstations with high-performance virtual zero-client desktops that strengthened security while delivering a better 3D graphics experience.

  • Zero-Day Attacks: Why you need a Deeper Level of Inspection

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.

  • Dealing with Data Sovereignty in the Cloud Era

    Sponsored by: VMware

    This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • Recognize Your Security Shortcomings and Address Them with Confidence

    Sponsored by: Dell, Inc. and Intel®

    This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.

  • Overcome the Attacker Advantage with McAfee Endpoint Security 10

    Sponsored by: Intel Security

    This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.