ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Cochrane Reclaims Website Security and Control with Neustar UltraDNS®

    Sponsored by: Neustar

    Discover how Cochrane was able to slash response times and ensure maximum server uptime. Now the team is empowered to log in and make the changes they need, when they need to make them.

  • April 2016 Neustar DDoS Attacks & Protection Report

    Sponsored by: Neustar

    This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future portends for your organization and learn why security should be a central concern for all devices on your network.

  • Risk Assessment

    Sponsored by: STEALTHbits

    Access this resource to learn how you can get a network-wide risk assessment in 5 easy steps. In as little as 5 hours, you'll learn your top 5 data security vulnerability and get insight on how to patch them up.

  • Harnessing the Power of Metadata for Security

    Sponsored by: Gigamon

    Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Trustwave

    There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

  • The Insider Threats: Be Protected with Advanced DNS Security

    Sponsored by: EfficientIP

    See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.

  • Addressing the Full Attack Continuum (BDA WP)

    Sponsored by: Cisco Systems, Inc.

    It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.

  • Open Access : Restrict access where it need be restricted

    Sponsored by: STEALTHbits

    Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.

  • Securing Connected Cars Through Comprehensive Software Testing

    Sponsored by: Synopsys

    There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Operationalize Security to Patch Vulnerabilities

    Sponsored by: BMC

    This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.

  • Here's What Your Personal Data is Going for on the Dark Web

    Sponsored by: BMC

    How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.

  • Enabling The Industrial Internet Through Software Assurance

    Sponsored by: Synopsys

    Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.

  • Cyberattacks that Transcend the Digital World

    Sponsored by: OpenDNS

    This informative podcast takes a look at the vast, interconnected systems supporting our daily life. How at risk are the industrial systems behind the light switch on your wall, the water out of your tap? Find out now.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • The Right Endpoint Protection for Your Organization

    Sponsored by: TrendMicro

    This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Benchmark Your Threat Detection Effectiveness

    Sponsored by: RSA

    This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.

  • Explore a Security Intelligence Model for Combating Cyber Threats

    Sponsored by: LogRhythm, Inc.

    Discover how to fully realize your security intelligence objectives. You'll learn how to keep your security architecture flexible to adopt and mature security intelligence capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.