ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Short Description: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is using it to sneak past other conventional security measures and how to stop it.

  • Tips for Streamlining Financial Processes and Providing Real Time Reporting

    Sponsored by: Infor

    Discover how to address the growing gap between what a modern financial department should be able to and what they are able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Sponsored by: AlienVault

    Discover a comprehensive overview of SIEM, including how it's changing, challenges faced by its users, different options, and how a unified platform can make all the difference when it comes it its deployment.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for UEBA, use machine learning to derive network context, and proven techniques from real customer deployments.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Take a Behavioral Bite Out of Crime

    Sponsored by: Infor

    44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    Discover and debunk several pervasive myths about encrypted communications and gain a solid understanding of its growing importance. Read on to answer: do current security measures slow encrypted traffic by up to 80%? Can this encrypted traffic create blind spots in security? And more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Balancing Personalization and Trust in the Age of the Customer

    Sponsored by: Gigya

    Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Read on to find out how such an approach has increased massive increases in usable customer data for companies such as Danone and Forbes.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Read on to discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • Time to Toughen Up for IoT

    Sponsored by: SearchSecurity.com

    The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives

    Sponsored by: Dell, Inc. and Intel®

    Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.

  • Security and Innovation Converge at Open Source Linux

    Sponsored by: Red Hat

    Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.

  • Definitive Guide: Securing the Mobile Enterprise

    Sponsored by: Aruba Networks

    While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.

  • 9 Ways Cybercriminals Can Compromise Business Communications

    Sponsored by: MASERGY

    Learn 9 of the most serious threats to your VoIP devices and networks in order to fight off determined cybercriminals.

  • Two Approaches to Cloud Security: API vs. Proxy

    Sponsored by: Palerra Inc.

    Uncover the difference between two different Cloud Access Security Broker (CASB) deployment strategies, API and Proxy, and what they can do to provide cloud security for your enterprise. You'll find a comparison of their features, learn how to decipher multimode CASBs, and more.

  • AWS Cautionary Tales and How to Avoid Becoming One

    Sponsored by: Palerra Inc.

    AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.

  • Salesforce Shield for Healthcare

    Sponsored by: Salesforce.com

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

  • State of PAM 2016

    Sponsored by: Thycotic

    In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.