ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Best Practices for Healthcare Data Breach Prevention

    Sponsored by: Absolute

    As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.

  • Computer Weekly: Data Danger

    Sponsored by: ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • Leveraging Office 365 with VMware AirWatch

    Sponsored by: vmware airwatch

    As enterprises embrace adoption of Microsoft Office 365,  achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how an enterprise mobility management tool easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data security.

  • A First Look at the Future of Windows Management and Security

    Sponsored by: vmware airwatch

    Watch this 3 minute webinar to learn how unified endpoint management technologies come together to lower the cost of managing your Windows deployments, secure endpoints and data on any network across any application, and deliver peak user experience across any device.

  • Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise

    Sponsored by: Citrix

    To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Six Steps to Effective Healthcare Data Breach Response

    Sponsored by: Absolute

    Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.

  • The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute

    Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.

  • Seeing Through the Clouds: Cloud Visibility Improves Network Security

    Sponsored by: Cisco Systems, Inc.

    This white paper explains why network telemetry is the key to better cloud security. Learn how network telemetry can expand advanced visibility, threat detection, and security analytics capabilities to the cloud for more comprehensive network protection.

  • How to Identity Web Threats in Real-Time

    Sponsored by: Blue Coat Systems

    Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.

  • The Suspicious Seven: A Network Visibility Checklist

    Sponsored by: Cisco Systems, Inc.

    Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.

  • Secure and Accelerate User Access to Web Applications

    Sponsored by: Blue Coat Systems

    Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.

  • Secure Enterprise File Sharing and Mobile Content Management

    Sponsored by: BlackBerry

    Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.

  • Deliver Complete Security for Enterprise Web Applications

    Sponsored by: Blue Coat Systems

    Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: KnowBe4

    This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Sponsored by: KnowBe4

    This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.

  • The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints

    Sponsored by: Absolute

    As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.

  • IDC Technology Spotlight: Modern "Embedded" Endpoint Security

    Sponsored by: Absolute

    This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.

  • Secure Email Against Targeted Phishing Attacks

    Sponsored by: Blue Coat Systems

    To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.

  • Accelerating Your Incident Response & Improving Your Network Forensics

    Sponsored by: Blue Coat Systems

    Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • How to Transform Employee Worst Practices Into Enterprise Best Practices

    Sponsored by: KnowBe4

    Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.

  • Data Privacy and Residency for Oracle Sales Cloud

    Sponsored by: Blue Coat Systems

    Discover how to protect your sensitive data for Oracle Sales Cloud, maintaining the control you need to confidently adopt cloud services. Learn how to ensure data compliance and protection, seamless user experience, cloud intelligence, auditing preparedness, and more.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: Fortinet, Inc.

    What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.

  • The Rise of Fileless Malware Attacks

    Sponsored by: Fortinet, Inc.

    This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.