ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Cyber security in the Middle East

    Sponsored by: ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Q&A: Analyzing DNS Services with Paul Vixie

    Sponsored by: Farsight Security

    Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.

  • End-to-End Visibility: The Foundation of Business-Driven Security

    Sponsored by: RSA

    Access this white paper now to learn how to gain visibility into your network and: how logs are not enough when it comes to visibility, a patchwork of point-solutions creates inefficient silos, modern infrastructure compounds blind spots, and more.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: SearchSecurity.com

    In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.

  • How to Bridge the Gap in Data Protection and Recovery

    Sponsored by: Veeam Software

    In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.

  • Cloud Security: An Example Threat Report

    Sponsored by: Cloudvisory

    Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.

  • 4 Requirements for a Multi-Cloud Security Approach

    Sponsored by: Cloudvisory

    Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.

  • How to Gain Peace of Mind in the Cloud: Email and Office 365

    Sponsored by: Hewlett Packard Enterprise

    Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.

  • Effective Information Governance Strategies

    Sponsored by: Iron Mountain

    In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process.

  • New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises

    Sponsored by: Hewlett-Packard Enterprise

    With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines.

  • Cloud Security Report: How is IT Responding to Today's Threats

    Sponsored by: Cloudvisory

    Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.

  • Dell EMC Data Protection: Your choice is simple

    Sponsored by: Dell EMC

    This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more.

  • 7 Questions to Achieve GDPR Compliance

    Sponsored by: Hewlett-Packard Enterprise

    Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more.

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • Migration to Exchange Online and Office 365: A Step-by-Step Guide

    Sponsored by: Hewlett Packard Enterprise

    For IT administrators who have not been involved in a previous migration to Office 365, there is a steep learning curve. In this step-by-step guide, learn how to select the migration option that makes most sense for your organization to ensure future success and reliable security.

  • Beginner's Guide to Hybrid Cloud Security

    Sponsored by: AlienVault

    Learn everything you need for a successful hybrid cloud deployment, including: the cloud security shared responsibility model, how familiar network security challenges persist in the cloud, what new security challenges emerge in the cloud, and a smarter approach to threat detection in hybrid cloud security.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • Information Insight for GDPR Compliance

    Sponsored by: Hewlett-Packard Enterprise

    Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more.

  • ISC2 CCSP

    Sponsored by: ISC2

    Examine the relationship between IT and the C-suite, as well as the rise of the cloud security professional as an emerging voice within IT and the business.

  • A Q&A About a Data Visibility System for AWS

    Sponsored by: Gigamon

    Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.

  • Your Guide To Today's Cloud Security Adoption Trends

    Sponsored by: ISC2

    Security of critical data systems remain a key barrier to adoption of cloud services. In this comprehensive cloud security report discover cloud adoption trends, top cloud security challenges, paths to stronger cloud security, and more.

  • Evolving Your Business with IoT: Six Steps to a Secure Digital Transformation

    Sponsored by: Appdirect

    Discover 6 steps to have your organization undergo a secure IoT digital transformation and enable new types of innovation, creativity, and business models.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell EMC and Microsoft

    In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.

  • Fourth Generation Data Leak Prevention

    Sponsored by: Ghangor Cloud

    In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.