ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • BYOD and Mobile Security Report

    Sponsored by: BitGlass

    Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.

  • How MDM Software Exposes Your Personal Data

    Sponsored by: BitGlass

    Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it.

  • The Top Cybersecurity Risks – And How Enterprises Are Responding

    Sponsored by: Arctic Wolf Networks, Inc.

    Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.

  • Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers

    Sponsored by: Bomgar Corp.

    Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.

  • Top 5 SIEM Challenges for the Midmarket

    Sponsored by: Arctic Wolf Networks, Inc.

    Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.

  • The 7 Step Hack: Thinking Like a Cybercriminal

    Sponsored by: Bomgar Corp.

    Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity.

  • Arapahoe House Secures BYOD

    Sponsored by: BitGlass

    In this case study examine how Arapahoe House, a non-profit & leading provider of substance use disorder treatment in Colorado, deployed a security policy for their BYOD users that allowed them to selectively wipe BYOD data, streamline provisioning and de-provisioning, gain visibility into all BYOD usage, and more.

  • Endpoint Security Suites: How 15 Providers Stack Up

    Sponsored by: Trend Micro

    In this 25-criteria evaluation of endpoint security suite providers, one firm has identified 15 significant game-changers. Uncover research, analysis, and scores for how each provider measures up so you can make the right choice.

  • Security Analytics: Searching for Meaning

    Sponsored by: SearchSecurity.com

    This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.

  • Optimize Your SIEM Operations

    Sponsored by: Intel Security

    Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.

  • Market Guide for Cloud Access Security Brokers

    Sponsored by: BitGlass

    Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.

  • Adjusting a Continuous Monitoring Strategy to a Hybrid Era

    Sponsored by: LogRhythm, Inc.

    Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.

  • In-Depth Reviews for SIEM Buyers

    Sponsored by: AlienVault

    Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: Intel Security

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • The Security Balancing Act

    Sponsored by: RES Software

    This infographic explains why taking a people-centric approach to managing security, governance, and identity and access management is the best way to secure and empower the digital workforce. Learn how to provide dynamic security for your productive workforce.

  • Protecting Data In The Age of Employee Churn

    Sponsored by: Code42

    Learn how the relatively high churn rate of today's knowledge workers, combined with trends like BYOD, puts enterprise data at risk, and how to mitigate it.

  • The business of Ransomware: What every CXO should know

    Sponsored by: Code42

    Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.

  • Biometrics: A Modern Method Of Authentication

    Sponsored by: Comarch

    Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.

  • Mitigating The Impact of Critical IT Events

    Sponsored by: Splunk

    In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.

  • 7 Steps to Protect Your Data Against Insider Threats

    Sponsored by: Imperva

    Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Create a Customized Testing Strategy

    Sponsored by: IBM

    Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.