ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Optimize Your SIEM Operations

    Sponsored by: Intel Security

    Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • Three Mistakes IT Makes That Could Cost Your Organization Millions

    Sponsored by: Globalscape

    IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.

  • Top 5 Reasons Public Sector Looks to the Cloud

    Sponsored by: Accenture

    As businesses continue to deal with digital transformation, public sector organizations have more requirements to deal with than those in the private sector. Discover the 5 key areas that make cloud the best option for public sector digital transformations.

  • 10 Reasons You Should Consider Commvault for Data Protection

    Sponsored by: Commvault

    Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • State of the Internet Report Q3 2016

    Sponsored by: Akamai

    This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.

  • State of the Internet Executive Summary

    Sponsored by: Akamai

    This report shows you up-to-date statistics on cybersecurity. Better enable your business to make intelligent, strategic decisions based on the information you'll learn.

  • Market Guide for Cloud Access Security Brokers

    Sponsored by: BitGlass

    Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.

  • Mitigate Security Risks with Hyperconverged Infrastructure

    Sponsored by: SimpliVity

    Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.

  • From Reactive to Proactive: How to Avoid Alert Fatigue

    Sponsored by: ThreatConnect

    Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.

  • Adjusting a Continuous Monitoring Strategy to a Hybrid Era

    Sponsored by: LogRhythm, Inc.

    Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.

  • IoT Guardian for the Healthcare Industry

    Sponsored by: Zingbox

    Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.

  • In-Depth Reviews for SIEM Buyers

    Sponsored by: AlienVault

    Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.

  • Threat Intelligence Platforms: A Research Report

    Sponsored by: AlienVault

    Find how a social media-esque, community-focused approach to threat intelligence has proven to be effective at identifying and analyzing emerging threats.

  • How to Build a Security Operations Center (on a Budget)

    Sponsored by: AlienVault

    In this in-depth guide, get step-by-step instructions on how to create and run an enterprise-level security operations center by combining 4 key ingredients – and without breaking the bank.

  • Balancing User Productivity and Security

    Sponsored by: RES Software

    Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: Intel Security

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • The Security Balancing Act

    Sponsored by: RES Software

    This infographic explains why taking a people-centric approach to managing security, governance, and identity and access management is the best way to secure and empower the digital workforce. Learn how to provide dynamic security for your productive workforce.

  • Neurosurgery Leader Improves Efficiency, Compliance And Security

    Sponsored by: RES Software

    Discover how Carolina Neurosurgery & Spine Associates (CNSA) adopted a digital workspace program that allowed them to not only improve their security, but also the effectiveness of their IT as a whole. Discover how they were able to increase clinician efficiency, reduce the risk of non-compliance, and improve cybersecurity.

  • Guide to Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.

  • Maintaining Compliance for the Cloud Generation

    Sponsored by: Blue Coat Systems

    Learn what regulations govern compliance in the cloud how to maintain them. Access this white paper now to discover the liability companies have from using various cloud apps, what industries are most affected by cloud compliance issues, how to ensure cloud vendors conform to compliance guidelines, and more.

  • Security Overview: SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.

  • Remove the Security Blind Spots Created by Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.