ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • What CIOs Need to Know About IoT and Security Risks

    Sponsored by: MASERGY

    Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.

  • Tackling Workplace Mobility

    Sponsored by: VMware

    84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.

  • Keep Your Data Safe for Office 365

    Sponsored by: Intel Security

    Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.

  • Protecting Threats in a Small Business Environment

    Sponsored by: CDW

    Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.

  • Small Business IT Security: Save Money, Save Face

    Sponsored by: CDW

    This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.

  • 3 Major Challenges to Securing Your Network

    Sponsored by: Juniper Networks, Inc.

    Get an overview of cloud strategies to help you address three major security challenges and protect your data as your organization evolves into a cloud-enabled enterprise.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Threat Defenses, Security Projects, and Cloud Security

    Sponsored by: TrendMicro

    As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.

  • Network Testing Types to Ensure Top Performance, ROI and Security

    Sponsored by: Ixia

    Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.

  • The Executive's Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.

  • Protect your Organization Against Cybercrime in the Digital Era

    Sponsored by: Dimension Data

    This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.

  • Taking Container Security to the Next Level Final

    Sponsored by: Black Duck Software

    This white paper explores the security concerns around container use and details how you can enact measures to mitigate the dangers. Access now and learn how you can protect code integrity when containers are in use and safely utilize open source code in general.

  • SCIENCELOGIC: Unmatched Visibility into Open Source

    Sponsored by: Black Duck Software

    This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • 5 Security Controls for an Effective Security Operations Center (SOC)

    Sponsored by: AlienVault

    Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

  • Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    Sponsored by: TrendMicro

    A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.

  • Mitigating and Protecting SAP and ERP Vulnerabilities

    Sponsored by: Onapsis

    This e-guide discusses the more than 95% of SAP systems that are exposed to vulnerabilities and could lead to a detrimental compromise of enterprise data and processes. Access this resource now and learn how to train your staff about security risks to adopt an end-to-end security approach.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Imperva

    You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".

  • 2016 Cyberthreat Defense Report

    Sponsored by: LogRhythm, Inc.

    This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.

  • PCI Compliance Protect your business from data breach

    Sponsored by: Earthlink.

    Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.

  • Oracle database licensing challenges

    Sponsored by: Matrix42

    This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • Vulnerability Response Best Practices

    Sponsored by: Alert Logic

    This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.

  • Cybersecurity Risks Masked by Controversial Vulnerability Counts

    Sponsored by: Symantec Website Security

    In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.

  • Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability

    Sponsored by: Symantec Website Security

    In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.