ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this product and its security effectiveness.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    Sponsored by: McAfee, Inc.

    This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Looming Cloud Security Concerns

    Sponsored by: McAfee, Inc.

    From finding the right tools and securing room for them in the budget to overcoming the skills gap, learn which concerns are ruling the cloud security landscape and find out how to overcome them.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Integrated Cloud Storage Solutions for Modern Data Management

    Sponsored by: Commvault AWS

    Managing your data is one of the most important things you will do over the course of the next few years, especially as you put your big data strategies into action. Access this white paper to learn how to utilize cloud storage platforms to optimize your data management and find where the actionable insights are hiding.

  • Closing the Skills Gap: Leveraging Automated Analytics for Cybersecurity

    Sponsored by: RSA

    This white paper explores how to bring automated analytics to bear and bolster your cybersecurity strategy. Overcome the talent shortage and discover how to leverage machine learning, AI, and cognitive capabilities in order to integrate analysis of user behavior patterns into incident detection.

  • Your Guide to Overcoming Cloud GRC Challenges

    Sponsored by: TechTarget

    Governance, risk and compliance (GRC) goals are tested by the proliferating use of cloud services – and it's even worse than IT organizations think. Our guide, CISOs Face Cloud GRC Challenges as Services Take Off, explores how to overcome the obstacles to achieving your cloud GRC goals.

  • An Introduction to the Security Advantages of Mirco-Segmentation

    Sponsored by: VMware

    Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.

  • How To Implement a Records and Information Management Risk Control Framework

    Sponsored by: Iron Mountain

    In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more.

  • Identify and Manage Fraud Better with Analytics

    Sponsored by: BAE Systems

    This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors.

  • SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race

    Sponsored by: SonicWall

    This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.

  • Fighting the Latest Evolution of Money Laundering

    Sponsored by: BAE Systems

    This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.

  • Improving and Accelerating Fraud Detection and Prevention

    Sponsored by: BAE Systems

    This resource explores how to combat modern financial crime and compliance challenges and improve your organization's ability to detect and prevent fraudulent claims, even in complex, high-volume environments. Discover a platform that enables you to detect more fraud faster, improve detection accuracy, accelerate decision-making, and more.

  • 6 Steps to Proactive Cybersecurity Protection

    Sponsored by: BAE Systems

    Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.

  • Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses

    Sponsored by: BAE Systems

    Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.

  • Navigating IT Transformation

    Sponsored by: HPE and Intel®

    IT transformation is the hot new trend, but you've got some hoops to jump through first. This comprehensive IDG paper is here to report on some of the common troubles that your peers are having with their IT transformations and what you can do to avoid these costly mistakes.

  • The Potential ROI of Fraud Detection and Prevention Tools

    Sponsored by: BAE Systems

    This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.

  • Do You Know Who I Am? Know Your Customer Systems Market Update

    Sponsored by: BAE Systems

    Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.

  • 2017 Annual Cybersecurity Report

    Sponsored by: Cisco Umbrella and Dimension Data

    This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.

  • Managing the Risks of Cryptocurrency

    Sponsored by: BAE Systems

    This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.

  • The new EUsecurityrequirements and you

    Sponsored by: Symantec & Blue Coat Systems

    This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Cybersecurity and Overcoming the Intelligence Disconnect

    Sponsored by: BAE Systems

    Cybersecurity is now a business risk issue like any other. In this research report, discover how to unite the two different perspectives of the C-Suite and IT decision-makers, especially in regards to what threats they think are greatest, who's accountable for defense, how to use outsourcing, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.