ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • A Ranking of Today's Endpoint Protection Platforms

    Sponsored by: Sentinel Labs, Inc.

    Open this Gartner Magic Quadrant report to get a clear comparison of how 22 endpoint protection platform providers stack up, as well as the strengths of each individual offering, and some cautions to be aware of so that you can be fully informed when making your purchasing decision.

  • Ransomware Is Here: What Can You Do About It?

    Sponsored by: Sentinel Labs, Inc.

    Ransomware is profitable and growing in popularity among hackers. Learn how to protect your enterprise by examining ransomware techniques and real-life examples.

  • How to Upgrade Your Endpoint Protection

    Sponsored by: Sentinel Labs, Inc.

    91% of successful data breaches start with attackers infecting an endpoint via a phishing attack. Learn why malicious actors are targeting endpoints, why they are particularly vulnerable, and how to stop your enterprise from falling prey.

  • How to Ensure You're Not Part of the Next Botnet

    Sponsored by: Sophos, Inc.

    Botnets are a near limitless resource of computing power for hackers. In this white paper learn how to avoid your machines and devices from falling prey to these types of manipulations and shut down this avenue of attack.

  • How to Protect Against Ransomware

    Sponsored by: Sophos, Inc.

    What does a typical ransomware attack look like? What security solutions should be in place to give the best possible defense? Discover the critical security technologies that every IT setup should include to thwart today's ransomware.

  • An Introduction to Open Source Licensing: A Legal Perspective

    Sponsored by: Flexera Software

    There is a lot of confusion when it comes to open source software (OSS). Discover a detailed presentation from expert Andrew Hall on what OSS is and its fundamentals, risks, benefits, obligations, restrictions, and how to ensure your organization is protected.

  • Don't Let Smart Devices Outsmart IT

    Sponsored by: Aruba Networks

    Mobility and the Internet of Things are changing both the IT landscape and our approaches to security. This infographic gives you the basics of delivering a security framework built on adaptive trust defense. You will learn about the growing risks and real-world solutions for the new era.

  • Securing the Web: The Plight of the Modern Cybersecurity Team

    Sponsored by: Comstor

    Whether they come from network, endpoint, or mobile devices, threats are getting more sophisticated and attack surfaces are getting larger. Discover how your security team can ensure that users get the same protection whether they are working on or off the corporate network using DNS security.

  • Waste Less Time Fighting Ransomware

    Sponsored by: Comstor

    Don't become another ransomware casualty in their growing number of attacks. Learn the inner working of the modern ransomware threat, as well as how to prevent and contain it from harming your organization.

  • Easily Connect and Deliver NGFW Services in AWS Multi-VPC Deployments

    Sponsored by: Juniper - AWS

    Most organizations want their data centers closer to end users. This white paper discusses the importance of a transit VPC and how it enables you to add next-generation firewall services and connectivity to large multi-VPC AWS deployments.

  • Advanced Endpoint Protection Test Report

    Sponsored by: Sentinel Labs, Inc.

    Join experts Thomas Skybakmoen and Morgan Dhanraj as they reveal independent test results of advanced endpoint protection with simulated malware, exploits, and blended threats.

  • vSRX Virtual Firewall-Based AWS Transit VPC

    Sponsored by: Juniper - AWS

    Access this white paper to learn about the prerequisites to deploying a virtual firewall as an application instance in the AWS EC2 used as a transit virtual private cloud function. You will also get step-by-step instructions to ensure your AWS security works properly.

  • What Every CSO Must Know About Open Source Software

    Sponsored by: Flexera Software

    Using open source software (OSS) without careful oversight is a potential for risk to every organization. Application security for open source strategy requires processes, training and tools. Access this resource to uncover everything your security team needs know about OSS.

  • Your Checklist to Preventing and Fighting Ransomware

    Sponsored by: Comstor

    With attacks like WannaCry and NotPetya in the news, the time to shore up your ransomware preparedness is now. Discover a 10 step checklist to improving your organization's ransomware defense.

  • Your Essential Guide to Cyberattacks

    Sponsored by: Comstor

    Anyone with malicious intent can now target specific users or organizations by making use of the services of a professional hacker. In this white paper get to know your enemy and the threat landscape your enterprise is facing today.

  • 30 Minutes to a More Secure Enterprise

    Sponsored by: Comstor

    Traditional defenses are no longer enough as under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Given the strain on your staff and already tight budget, DNS-layer security is becoming more valuable, especially as your first line of defense.

  • Identify, Connect, and Protect Mobile and IoT at the Edge

    Sponsored by: Aruba Networks

    Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.

  • Don't Settle for a Patchwork: Synch-up your Security Solutions

    Sponsored by: Sophos, Inc.

    Patchwork solutions working in isolation can't keep up with coordinated, complex attacks. Discover how endpoint and network security can work in concert to protect your enterprise from today's threats.

  • Phishing is Big Business. Don't Get Hooked.

    Sponsored by: Sophos, Inc.

    91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.

  • Leveraging Multi-factor Authentication to Power Protection

    Sponsored by: Centrify Corporation

    According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.

  • How to Detect & Respond to a Petya Ransomware Attack

    Sponsored by: AlienVault

    On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.

  • Case Study: Auto Supplier's DNS Security Lowered Alerts, Increased Protection

    Sponsored by: Comstor

    Learn how a major automotive group was able to preemptively secure their globally distributed network against potential threats, safeguarding 2,500 users and their valuable intellectual property.

  • 6 Best Practices for Securing AWS Environments

    Sponsored by: Centrify Corporation

    Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • What Should Happen after an Employee Clicks on a Malicious Link?

    Sponsored by: Vircom

    What do you do if an employee clicks on a malicious link? The clock is already ticking. Inside this e-guide, expert Matthew Pascucci discusses how to handle the aftermath of an attack.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.