ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • App Security: Shore up the Weaknesses in Your WAF

    Sponsored by: tCell

    Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses, protecting your web applications and modernizing your security policy to stand firm against today's threats landscape.

  • Sonicwall 2017 Annual Threat Report

    Sponsored by: Dell SonicWALL

    The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. Discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape in this expansive threat report.

  • HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.

  • Perception vs. Reality: The Apps You Don't Know You're Using Are Vulnerable

    Sponsored by: Symantec & Blue Coat Systems

    Tackle shadow data in this report on the perceptions versus the reality of how organizations really use cloud applications. Discover the massive backdoor they can often leave in your security policy, and what you can do to mitigate the risk.

  • Better Collaboration Tools to Satisfy Both Employees and IT

    Sponsored by: Box

    Access this resource now to gain insight into how you can reinvent IT to enable your enterprise to collaborate effectively and deliver results without the traditional stigma of blocking collaboration instead of enabling it.

  • Virtual Desktop Playbook

    Sponsored by: Dizzion

    You need to know exactly what you're doing when architecting and building your own virtual desktop infrastructure (VDI. Access this e-book to learn what questions you need to ask during each step of the VDI process and ensure that you aren't overwhelmed before you can realize VDI's benefits.

  • 10 Tips for Protecting Data in the Cloud

    Sponsored by: Symantec & Blue Coat Systems

    Discover 10 tips on how to keep your data safe once you adopt cloud services. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.

  • DaaS Provider Evaluation Checklist

    Sponsored by: Dizzion

    Companies are turning to virtual desktops to assist in supporting emerging mobility efforts. Desktop-as-a-service (DaaS) is being implemented virtual desktops rather than building their own VDI. Access this checklist to make sure that you're DaaS provider is meeting your business needs.

  • Top 5 Questions Answered on How to Best Protect Your Data in the Cloud

    Sponsored by: Symantec & Blue Coat Systems

    Discover 5 vital cloud data protection questions answered in this white paper, covering your organizations first steps into migrating to the cloud all the way to dealing with long-term compliance issues.

  • A Look at How Data Privacy Laws Impact Cloud Expansion in Germany

    Sponsored by: Symantec & Blue Coat Systems

    Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.

  • Top 10 Factors that Ensure VDI Success

    Sponsored by: Pure Storage

    Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are being widely adopted throughout the industry, with many already running VDI on-premise. Access this e-book for the top 10 factors of a successful VDI strategy and why storage is a key component.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.

  • Experts Debate National Cybersecurity Policy Suggestions At RSAC 2017

    Sponsored by: Absolute

    What exactly are President Trump's potential policies around encryption and international data flow and how might we all be affected? Download and find out the facts direct from the show floor.

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.

  • Realize the Promise of VDI with Flash Storage

    Sponsored by: Pure Storage

    If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • The security challenge for SMBs in a mobile world

    Sponsored by: Microsoft

    In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately, learn what benefits you can expect for your business.

  • 10 Reasons Why Your IT Incidents Aren't Resolved Faster

    Sponsored by: EverBridge Inc.

    When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.

  • The security challenge for SMBs in a mobile world

    Sponsored by: Microsoft

    In this paper, uncover how blending on-site security with MDM will give you a more flexible and scalable way to ensure that your mobile devices, data, and user identities are secured. Read on to explore why cloud-based management of devices, information, and users is so important, and ultimately learn what benefits you can expect for your business.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity

    Sponsored by: IBM

    The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.

  • Today's State of Endpoint Protection & Management

    Sponsored by: Absolute

    Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.

  • Your Guide to Advanced Persistent Threat Protection

    Sponsored by: Forcepoint

    In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.

  • Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats Like Ransomware

    Sponsored by: Iron Mountain

    As the threat landscape changes, you need to be able to change with it. In this expert-eguide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.

  • What's The Best Risk Analysis Method for Enterprises?

    Sponsored by: Presidio Networked Solutions

    In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.