ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • What CIOs Need to Know About IoT and Security Risks

    Sponsored by: MASERGY

    Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.

  • Keep Your Data Safe for Office 365

    Sponsored by: Intel Security

    Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.

  • Protecting Threats in a Small Business Environment

    Sponsored by: CDW

    Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.

  • Small Business IT Security: Save Money, Save Face

    Sponsored by: CDW

    This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.

  • 3 Major Challenges to Securing Your Network

    Sponsored by: Juniper Networks, Inc.

    Get an overview of cloud strategies to help you address three major security challenges and protect your data as your organization evolves into a cloud-enabled enterprise.

  • Network Testing Types to Ensure Top Performance, ROI and Security

    Sponsored by: Ixia

    Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.

  • The Executive's Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.

  • Protect your Organization Against Cybercrime in the Digital Era

    Sponsored by: Dimension Data

    This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.

  • Taking Container Security to the Next Level Final

    Sponsored by: Black Duck Software

    This white paper explores the security concerns around container use and details how you can enact measures to mitigate the dangers. Access now and learn how you can protect code integrity when containers are in use and safely utilize open source code in general.

  • SCIENCELOGIC: Unmatched Visibility into Open Source

    Sponsored by: Black Duck Software

    This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • Mitigating and Protecting SAP and ERP Vulnerabilities

    Sponsored by: Onapsis

    This e-guide discusses the more than 95% of SAP systems that are exposed to vulnerabilities and could lead to a detrimental compromise of enterprise data and processes. Access this resource now and learn how to train your staff about security risks to adopt an end-to-end security approach.

  • Oracle database licensing challenges

    Sponsored by: Matrix42

    This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.

  • Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection

    Sponsored by: Veeam Software

    This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.

  • Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks

    Sponsored by: Cloudmark

    In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.

  • Critical Capabilities for Security Information and Event Management (SIEM)

    Sponsored by: LogRhythm, Inc.

    Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.

  • An Examination of Web App Security Process Management

    Sponsored by: WhiteHat Security

    In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.

  • Bolster Your Web Application Security

    Sponsored by: WhiteHat Security

    This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.

  • Web Security: Fighting Off Zero Day Attacks

    Sponsored by: WhiteHat Security

    Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • Vulnerability Response Best Practices

    Sponsored by: Alert Logic

    This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • What to Look for in Vulnerability Management

    Sponsored by: SearchSecurity.com

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.