ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Unlocking Business Success The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.

  • FortinetCSO_QP

    Sponsored by: Fortinet, Inc.

    This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Protecting_Against_APTs_minibook

    Sponsored by: Fortinet, Inc.

    This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.

  • How to Protect Patient Data in the Cloud - Best Practices Recommedations

    Sponsored by: Digital Guardian

    This white paper shows you best practices for applying DLP to the cloud.

  • Cybersecurity and Data Theft Prevention

    Sponsored by: Forcepoint

    This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.

  • Cyber Dwell Time and Lateral Movement

    Sponsored by: Forcepoint

    Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.

  • IDC-Analyst-Connection-ISFW

    Sponsored by: Fortinet, Inc.

    This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.

  • SG-ISFW-Fortinet

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.

  • Forrester Report -Building_An_Effective_Breach_Detection_And_Response_Strategy

    Sponsored by: Fortinet, Inc.

    This white paper shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.

  • Who's Spying on You?

    Sponsored by: Kaspersky Lab

    Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.

  • Financial Institutions Data Quality Is Vital For BCBS 239 Compliance

    Sponsored by: Infogix

    Discover how your organization can incorporate data quality checks into your risk data aggregation and reporting processes by downloading this e-book now. Learn how you can stay in compliance with BCBS 239 guidelines.

  • Advanced Threat Protection Buyer's Guide

    Sponsored by: Fortinet, Inc.

    This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.

  • Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.

  • Building an Enterprise Security Architecture

    Sponsored by: Forcepoint

    This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.

  • The human factor research report 2016

    Sponsored by: Proofpoint, Inc.

    This white paper takes an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.

  • How Credential Phishing is Changing - How to Stop It

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.

  • Three guiding principles for data security and compliance

    Sponsored by: IBM

    This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    This white paper talks about steps you should take to best protect your virtualized cloud data.

  • Arming the front line

    Sponsored by: IBM

    This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.