ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise

    Sponsored by: Kaspersky Lab

    A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.

  • The Threats From Within

    Sponsored by: Kaspersky Lab

    With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.

  • Virtualization Security: Know Your Options

    Sponsored by: Kaspersky Lab

    Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO

    Sponsored by: Kaspersky Lab

    In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.

  • Future Risks Be Prepared

    Sponsored by: Kaspersky Lab

    An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.

  • Rethinking IT Security

    Sponsored by: Kaspersky Lab

    This eBook explores the features that make antivirus a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.

  • Management of Native Encryption for Apple FileVault and Microsoft BitLocker

    Sponsored by: Intel Security

    With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack.

  • Application Session Filtering Cookbook

    Sponsored by: Gigamon

    This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.

  • Storage Efficiencies with Hyper-V at the Virtual and Physical Layer

    Sponsored by: Veeam Software

    Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.

  • Three Critical Considerations to Achieve Information Governance

    Sponsored by: Commvault

    Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • SB-Secure-Access-for-Retail

    Sponsored by: Fortinet, Inc.

    When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • When App is the Business, the Business is the App Vol. 3

    Sponsored by: IBM MaaS360

    IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Evaluating Hybrid Cloud Security Options to Control Network Security

    Sponsored by: MASERGY

    This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.