ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails

    Sponsored by: Proofpoint, Inc.

    In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.

  • 10 Questions to Ask Your Vendor about File Gateway Consolidation

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • How Healthcare Organizations Both Enable Mobile Users and Stay Compliant

    Sponsored by: BlackBerry

    Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.

  • Why Application Delivery Matters in the Digital Economy

    Sponsored by: Citrix

    Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Complete Analysis of the Top SIEM Vendors

    Sponsored by: AlienVault

    The Magic Quadrant summarizes Gartner's yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.

  • Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential

    Sponsored by: LogicNow

    This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.

  • How to Capitalize on the Complex Cyber Threat Landscape

    Sponsored by: LogicNow

    This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.

  • CIS Critical Security Controls - Accelerated & Simplified

    Sponsored by: AlienVault

    The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.

  • 5 Security Controls for an Effective Security Operations Center (SOC)

    Sponsored by: AlienVault

    Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

  • How to Raise your Organization's Security Maturity Level

    Sponsored by: LogRhythm, Inc.

    This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.

  • Next Generation Firewall Test Report

    Sponsored by: Check Point Software Technologies Ltd.

    Access this report to learn what happened when a firewall device was put to the test. Uncover exclusive findings on studies of firewall policy enforcement, application control, and more.

  • Protect Against Zero-Day Attacks at the Every Level

    Sponsored by: Check Point Software Technologies Ltd.

    It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.

  • 4 Steps to Developing a Proactive Security Program

    Sponsored by: Dell SecureWorks

    The harsh truth of security today is reactive strategies are outdated and it's time to switch gears to a proactive defense. This paper outlines the discrete layers and levels needed for a proactive security strategy. Inside, learn how to shift from a reactive to a proactive defense in 4 simple steps.

  • Charting a New Course for IT Security with Coordinated Threat Defenses

    Sponsored by: TrendMicro

    Access this white paper and find out how you can achieve fewer compromises, substantially shorter dwell times for threats that do manage to get through, and far less effort and expense required for incident response and to operate and maintain your security infrastructure.

  • Make Security Part of Your Client Systems Refresh

    Sponsored by: Dell, Inc. and Intel®

    To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.

  • Study Shows New Generation of IT Security Threats

    Sponsored by: Dell, Inc. and Intel®

    This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

  • Formulate a Game Plan for Closing the SecOps Gap

    Sponsored by: BMC

    Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Top 5 Benefits of a Security Operations Center

    Sponsored by: IBM

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.