ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • Cisco 2016 Annual Security Report

    Sponsored by: Cisco

    This security report presents research, insights and perspectives highlighting the challenges that defenders face in blocking attackers.

  • Layered Security Strategies for a Mobile-First World

    Sponsored by: Microsoft

    This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.

  • Digital Guardian Data Loss Prevention

    Sponsored by: Digital Guardian

    Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage

  • Benefits of UTM Products and Evaluating Next-Gen Firewall Vendors

    Sponsored by: WatchGuard Technologies, Inc.

    This expert e-guide explains how UTMs work and benefit your network security strategy by closing vulnerability gaps. Continue reading and discover how to reduce security incidents and the top questions to evaluate next-gen firewalls to bolster security.

  • Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats

    Sponsored by: Digital Guardian

    In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.

  • 5 Ways Your Vendor Risk Management Program Leaves You in the Dark

    Sponsored by: BitSight

    In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.

  • The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs

    Sponsored by: CloudPassage

    In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises.

  • SANS- A Proactive Response to Incident Response

    Sponsored by: Blue Coat Systems

    In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.

  • Global Threat Intelligence Report

    Sponsored by: Dimension Data

    This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.

  • The CISO Role and the Ups and Downs of Cloud Compliance

    Sponsored by: CloudPassage

    In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.

  • What Story Does Your IT Security Tell?

    Sponsored by: Prelert

    In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • Secure Any Data, Anywhere

    Sponsored by: Vera

    In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.

  • Eliminating the Drawbacks of Distributed SaaS Provider Identity

    Sponsored by: F5 Networks

    In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.

  • Factoring the Human Element into Your Data Breach Response

    Sponsored by: AllClear ID

    Access this white paper to see how emotional reactions to a security breach can affect your crisis management.

  • FedRAMP and the Department of Defense's Security Requirements Guide

    Sponsored by: Coalfire

    This white paper reviews FedRAMP, the Security Requirements Guide (SRG) and provides guidance for cloud service providers that are interested in upgrading to the new baseline.

  • Top 6 Dangers of Not Inspecting SSL Traffic

    Sponsored by: A10 Networks

    Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.

  • Freedom to Roam

    Sponsored by: ComputerWeekly.com

    This month, CW Europe looks in-depth at an issue that is set to impact people across all 28 European Union member states, the abolition of mobile roaming charges, set for mid-2017.

  • Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare

    Sponsored by: SecureAuth

    In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.

  • Using Identity to Create Next Generation, Risk-based Access Management

    Sponsored by: SecureAuth

    In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.

  • Evaluating Standout Services in the Cloud Identity and Access Management Sector

    Sponsored by: SecureAuth

    If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.

  • The Trust Cost of a Data Breach & How to Prepare

    Sponsored by: AllClear ID

    This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Threat Detection Methods and Best Practices

    Sponsored by: Interset Software Inc.

    This e-guide will explain to you how the industry is changing and adapting new functionality to protect against ever-evolving attacks. It will teach you how to confidently choose the security tools you'll need that will provide proper functionality and value.

  • The Technology Industry 2016

    Sponsored by: ComputerWeekly.com

    Most permanent IT professionals have seen their salaries rise over the past four years, and 15% are reporting pay rises of more than 10%, the Computer Weekly/Mortimer Spinks 2016 survey reveals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.