ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: LogicNow

    Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    Discover a step-by-step process on how to revamp your IAM and access policies to ensure that business objectives related to security, productivity or compliance can be met, both in the short term and as your organization continues to evolve in the future.

  • A Powerful Next-Gen Antivirus Solution

    Sponsored by: Carbon Black

    Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.

  • Three Golden Rules for Safe and Sound Endpoints

    Sponsored by: IBM

    Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.

  • Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers

    Sponsored by: Bomgar Corp.

    Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.

  • Reduce Open Source Security Risk: Strategies, Tactics and Tools

    Sponsored by: Rogue Wave Software

    Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.

  • 4 Strategies to Reduce Your Open Source Risk

    Sponsored by: Rogue Wave Software

    Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • Threats and Mitigations: A Guide to Multi-Layered Web Security

    Sponsored by: Akamai

    Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.

  • Threat Summary: Top 2016 Cyber Risks

    Sponsored by: Proofpoint, Inc.

    Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.

  • Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Mitigating Security Risk from Partners, Affiliates and Suppliers

    Sponsored by: Dell SecureWorks

    Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.

  • Infographic: Mitigating the Impact of Critical IT Events

    Sponsored by: Splunk Services UK Ltd

    Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.

  • 3 Steps to Get Started with Web Application Security

    Sponsored by: Veracode, Inc.

    Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.

  • Cracking the Code on Application Security Success

    Sponsored by: Veracode, Inc.

    Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • Are You Confident or Complacent About Your Security?

    Sponsored by: Absolute

    In this report, uncover the survey results of over 500 IT security professionals and what they believe is the biggest threat to organizations today, confessions on what really goes on in enterprise IT, and more.

  • Benefits of Security Intelligence Services

    Sponsored by: Kaspersky Lab

    This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.

  • Application Security Assessment

    Sponsored by: Kaspersky Lab

    Access this overview of an app security assessment that uncovers and mitigates vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.