ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Sleeping Well with Cloud Services

    Sponsored by: Comarch

    As cloud-based solutions grow in popularity, so too do concerns surrounding security. Access this white paper to learn about the state of cloud service security and what to look for in any services you might contract moving forward.

  • Secure Apps at the Speed of DevOps

    Sponsored by: Veracode, Inc.

    This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.

  • How to Automate Security into Your DevOps Pipeline

    Sponsored by: Veracode, Inc.

    Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.

  • Unmask Evasive Threats: Zero-Day Threat Detection and App Containment

    Sponsored by: McAfee, Inc.

    This white paper explores how to bolster your defense to catch up to and overcome advanced malware threats. Fortify endpoints and learn how to halt zero-day malware in its tracks by discovering which threat detection and containment tools can unmask the most sophisticated hidden threats.

  • Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities

    Sponsored by: IBM

    Learn how augmented intelligence and cognitive technology, as part of a UEM, can improve mobile security and reduce vulnerabilities, increase workforce productivity, help your organization make more informed decisions, and more.

  • Maximizing IT Security with Configuration Management

    Sponsored by: Puppet

    This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.

  • Ransomware: Everything You Need to Know

    Sponsored by: Cisco Systems, Inc.

    Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.

  • The Ultimate Guide to Cybersecurity to Drive Profitability

    Sponsored by: Cisco Systems, Inc.

    This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.

  • 2017 Annual Cybersecurity Report

    Sponsored by: Cisco Systems, Inc.

    This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Busting the Myth of the Malware “Silver Bullet”

    Sponsored by: McAfee, Inc.

    This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • Exploit Kits: Getting In by Any Means Necessary

    Sponsored by: Palo Alto Networks

    This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.

  • Data Breaches: Is Prevention Practical?

    Sponsored by: Palo Alto Networks

    Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: Solarwinds MSP

    MSPs are forced to move at the pace dictated by cybercriminals, rapid. Learn how to not only manage customers' hardware and software but also their data. Uncover how to protect customer's confidential or regulated data, manage their vulnerabilities and demonstrate the value of these activities in easy to understand formats.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Symantec & Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.