ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs

    Sponsored by: Dell, Inc., Intel and VMware

    As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.

  • Brasfield and Gorrie builds productivity and security with paperless collaboration

    Sponsored by: Citrix

    Mobility is becoming the business norm. This means that security needs to account for the flexible nature of mobile devices. Access this resource to learn about a solution that allows employees to collaborate and share files and data remotely without taking visibility and control from IT.

  • Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings

    Sponsored by: Dell, Inc., Intel and VMware

    Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.

  • SCIENCELOGIC: Unmatched Visibility into Open Source with Black Duck

    Sponsored by: Black Duck Software

    This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improved efficiency and, most importantly, security by reviewing their code before their products hit the market and seeing exactly what they needed to change.

  • A Computer Weekly Buyer's Guide to Access Control

    Sponsored by: ComputerWeekly.com

    In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.

  • For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud

    Sponsored by: AT&T

    As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails

    Sponsored by: Proofpoint, Inc.

    In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Building the Next-Generation End-to-End IP Communications Architecture

    Sponsored by: Oracle Corporation

    Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.

  • Communications Security: A Blueprint for Enterprise Session Border Controller Deployments

    Sponsored by: Oracle Corporation

    Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.

  • 2015 Gartner Group Magic Quadrant on Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • A Foundation for Next-Generation Datacenter and Cloud-Based Security

    Sponsored by: Citrix

    Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.

  • The Search for Answers to 'Advanced Threat' Defense

    Sponsored by: Dimension Data

    This e-guide introduces a report that looks at mobile data protection. It also identifies strategies which companies are using to improve monitoring of corporate data, and prevent its loss through mobile applications and devices.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Citrix

    This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.

  • 10 Questions to Ask Your Vendor about File Gateway Consolidation

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • Governing in the Cloud

    Sponsored by: EMC

    The cloud is transforming IT and data storage, but government and large public organizations have obvious restrictions on how they can use the public cloud to store data. Access this microsite to how the government is benefiting from on-premise object storage.

  • Is It Time to 'Software-Define' Your Network Security?

    Sponsored by: SearchSecurity.com

    Finding security in SDN means and methods

  • Why Application Delivery Matters in the Digital Economy

    Sponsored by: Citrix

    Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.

  • Securing the Internet of Things: 6 Crucial Steps

    Sponsored by: Hewlett-Packard Enterprise

    Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.

  • 3 Areas Where Healthcare Providers Need Your MSP Expertise

    Sponsored by: Solarwinds N-able

    The healthcare market represents a huge opportunity for managed services providers (MSPs), and analysts predict this trend will continue to expand for years to come. Access this eBook to learn about healthcare information technology needs and how to meet them.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Visual Analytics: Easily Explore Data to Make Decisions You Can Trust

    Sponsored by: TIBCO Software Inc.

    Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.

  • Server Hosted Virtual Desktops: How the Top Seven Providers Stack Up

    Sponsored by: Citrix

    With the many options for VDI, it can be hard to choose which one is suited for your business. So before you jump into a VDI deployment, access this report to assess the state of the VDI vendor market and gain insight into the strengths and weaknesses of the top seven vendors as well as how these vendors stack up against each other.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.