ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Enterprise Endpoint Security Benchmark Performance Report

    Sponsored by: Symantec & Blue Coat Systems

    This white paper presents the results of an independent test of four leading endpoint security solutions against 17 performance metrics, including on-demand scan time, file compression, and network throughput. Read on to get all the facts you need to determine 2017's endpoint security market leaders.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • 4 Mobile Security Insights for CISOs

    Sponsored by: Lookout

    Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.

  • Bracing for Digital Disruption: What the CIO Needs to Know

    Sponsored by: Infor

    This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.

  • Sleeping Well with Cloud Services

    Sponsored by: Comarch

    As cloud-based solutions grow in popularity, so too do concerns surrounding security. Access this white paper to learn about the state of cloud service security and what to look for in any services you might contract moving forward.

  • Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.

  • How Oracle SPARC S7 Server Compares to Its Competition

    Sponsored by: Oracle Corporation

    The paper discusses the performance, risk management , and total cost of ownership (TCO), and highlights the advantages that the Oracle SPARC S7 Server delivers.

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    Sponsored by: McAfee, Inc.

    This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Looming Cloud Security Concerns

    Sponsored by: McAfee, Inc.

    From finding the right tools and securing room for them in the budget to overcoming the skills gap, learn which concerns are ruling the cloud security landscape and find out how to overcome them.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • An Introduction to the Security Advantages of Mirco-Segmentation

    Sponsored by: VMware

    Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.

  • How To Implement a Records and Information Management Risk Control Framework

    Sponsored by: Iron Mountain

    In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more.

  • Navigating IT Transformation

    Sponsored by: HPE and Intel®

    IT transformation is the hot new trend, but you've got some hoops to jump through first. This comprehensive IDG paper is here to report on some of the common troubles that your peers are having with their IT transformations and what you can do to avoid these costly mistakes.

  • The Ultimate Guide to Cybersecurity to Drive Profitability

    Sponsored by: Cisco Systems, Inc.

    This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.

  • 2017 Annual Cybersecurity Report

    Sponsored by: Cisco Systems, Inc.

    This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.

  • The new EUsecurityrequirements and you

    Sponsored by: Symantec & Blue Coat Systems

    This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • What's The Best Risk Analysis Method for Enterprises?

    Sponsored by: Presidio Networked Solutions

    In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.

  • Leverage On-Demand Testing with Vulnerability Analytics

    Sponsored by: IBM

    Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.