ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Communications as a Service: Improving Response Time and Resiliency During Critical Events

    Sponsored by: IBM

    Safeguard your organization during downtime by leveraging cloud-enabled crisis and incident management. Read on to improve operational processes during unplanned critical events with a service that will boost response effectiveness via real-time situational awareness, demonstrate regulatory compliance, and more.

  • DR Tabletop Testing Simulator

    Sponsored by: Databarracks

    Explore three disaster scenarios and answer the provided questions to reveal the appropriate recovery steps for each situation.

  • Information Security Consulting Services Report

    Sponsored by: IBM

    This Forrester report evaluates 13 most significant information security consulting service providers against a 31 point criteria. It details how well these consultancies fulfill the criteria and where they stand in relation to each other.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Risk Register and Matrix

    Sponsored by: Databarracks

    Gain access to a Risk Register and Matrix, which allows you to choose specific threats your organization faces and visualize them according to their likelihood of happening and the severity of their potential impact to find out the influence they have on your organization.

  • The case for security intelligence services, hosted from the cloud

    Sponsored by: IBM

    Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.

  • 2016 Cyber Security Intelligence Index

    Sponsored by: IBM

    This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Gartner 2016 Magic Quadrant for Identity Governance and Administration

    Sponsored by: IBM

    This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For Better Access Governance, Look Beyond Roles to

    Sponsored by: IBM

    Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • Engineering Company's Multi Cloud Success Story

    Sponsored by: TrendMicro

    Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs

  • Achieving High Fidelity Security: An EMA White Paper

    Sponsored by: RSA

    In the security context, "high fidelity" communicates the ability to provide a richer experience to the security analyst to deliver better security outcomes. Discover the benefits of using both network and endpoint data with a strong analysis toolset to create high-fidelity security.

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • Manufacturing Company's AWS Success Story

    Sponsored by: TrendMicro

    If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.

  • How Healthcare Benefits from Cloud-Delivered Security

    Sponsored by: OpenDNS

    Cloud-delivered security is a cost-efficient and flexible method for dealing with healthcare security threats, while also improving your organization's ability to meet expanding compliance mandates. Discover how you can protect the full range of systems and requirements in your organization.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • Frost & Sullivan Best Practices Research: Network Security Forensics

    Sponsored by: RSA

    This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.

  • Account Takeover How Hacking Happens in 2016

    Sponsored by: IMMUNIO, Inc.

    This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.

  • Inside Job: A Better Strategy to Stop Insider Threats

    Sponsored by: Infor

    Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.

  • Deep Security Protection from Ransomware

    Sponsored by: TrendMicro

    Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.