ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies White Papers

  • Your Blueprint to Securing Your Public and Hybrid Cloud

    Sponsored by: Fortinet, Inc.

    Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.

  • Policing cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Because high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do.

  • The Changing Workforce: Automation & the Role of Ex-Hackers

    Sponsored by: Radware

    The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise

    Sponsored by: Radware

    Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.

  • The Benefits of Conducting a Network Security Overview

    Sponsored by: Gigamon

    Learn the case for conducting security overviews of every enterprise initiative. By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team.

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • Give Your Threat Counter-Measures a Shot in the Arm

    Sponsored by: Fortinet, Inc.

    Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • BYOD & MDM: Why you’re still at risk – and what you can do about it

    Sponsored by: Proofpoint, Inc.

    In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.

  • Security Framework: A Guide for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • Focus: IT Security in the Middle East

    Sponsored by: ComputerWeekly.com

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

  • Trusted Identities in Digital Business The Benefits of PKI

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.

  • Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture

    Sponsored by: EfficientIP

    Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.

  • Optimize High-Performing DNS Infrastructures for Greater Security

    Sponsored by: EfficientIP

    In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.

  • See How Phillip Morris Ramped Up its Mobile Management Across 60 Countries

    Sponsored by: MobileIron

    Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.

  • Protecting Web Services for Grand Slam Roland-Garros

    Sponsored by: EfficientIP

    Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.

  • Case study : How the French Ministry of Education strengthens front-end security

    Sponsored by: Forcepoint

    Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.

  • Microsoft Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware, Inc.

    Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.

  • Focusing on Application Security is More Important than Ever

    Sponsored by: Onapsis

    This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.

  • Mobile Malware Hits Active Sync-Only Devices

    Sponsored by: MobileIron

    Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.

  • eBook : Your Guide to Advanced Evasion Techniques

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • Is FDE Enough to Thwart "Evil Maid" Attacks?

    Sponsored by: Dimension Data

    In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.