ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    Learn the essentials of formulating a mature information security program from this white paper, which will clarify the major points of contention surrounding the HITRUST Common Security Framework (CSF) Assurance Program. Access now to obtain answers to 20 FAQ to bolster the security posture of your healthcare organization.

  • State of Trust Gap in 2015

    Sponsored by: MobileIron

    Discover important expectations and viewpoints employees have about their enterprise's privacy policies on personal data located on mobile devices. Uncover statistics and global highlights derived from the Trust Gap Survey data.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Secure Enterprise Email on Mobile Devices

    Sponsored by: IBM

    Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

  • Mobile Threat Management

    Sponsored by: IBM

    Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.

  • BYOD Cross-Platform Security: Protecting Enterprise Data

    Sponsored by: IBM

    In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.

  • Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence

    Sponsored by: IBM

    With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.

  • Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting

    Sponsored by: Proofpoint, Inc.

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • How Tech-Savvy Workers are Affecting Enterprise Security

    Sponsored by: Unisys

    Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.

  • 2016 Next-gen Infrastructure Security Report

    Sponsored by: Illumio

    The modern cybersecurity landscape is changing, how far are you willing to go to stay safe? This 2016 Next-gen Infrastructure Security Report will provide an overview of technology focusing on cloud and the challenges emerging with the software-defined anything (SDx) infrastructure.

  • The State of Dynamic Data Center and Cloud Security in the Modern Enterprise

    Sponsored by: Illumio

    In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy

    Sponsored by: Intersect Alliance

    Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.

  • Healthcare CIOs Share Cybersecurity Best Practices

    Sponsored by: Symantec Corporation

    Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.

  • The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim

    Sponsored by: Unisys

    Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.

  • A Smart Way to Protect Windows Server 2003

    Sponsored by: Unisys

    Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.

  • There's Never Been A Better Time to Worry Less and Innovate More

    Sponsored by: Cisco

    You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.

  • Connected Medical Devices Meet FDA Scrutiny

    Sponsored by: Symantec Corporation

    Cybersecurity threats to medical devices are a growing concern, particularly in the new era of IoT. Discover the FDA-recommended steps that manufacturers and users of connected medical devices should take to ensure cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.