ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • How to Build Application Security into The Entire SDLC

    Sponsored by: TechData - HPE

    Get a rundown of not only how app security should ideally work, but also how to tailor your security measures to match your enterprise's needs.

  • The Smarter SMB’s Guide to Ransomware

    Sponsored by: Barracuda Networks

    Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works as well as the most common variants that are active today.

  • 5 Tips for Choosing a Next-GenerationEndpoint Security Solution

    Sponsored by: Cisco

    Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape. Learn what should be covered, how, and common issues associated with choosing the one right for you.

  • Financial markets regulatory outlook 2017

    Sponsored by: ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: Hewlett-Packard Enterprise

    Discover the not only a rundown of the threats that you need to prepare for if disaster strikes, but also the backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.

  • Security Everywhere: A Growth Engine for the Digital Economy

    Sponsored by: Cisco

    Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.

  • How Open Source Subscriptions Deliver Business Value

    Sponsored by: Red Hat

    Transferring to open source software (OSS) requires careful guidance to ensure security and maximize ROI during execution. Access this white paper to learn what to look for in an OSS vendor to guide your transition and see what one company offers as part of their customer experience.

  • Cybersecurity as a Growth Advantage

    Sponsored by: Cisco

    Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.

  • Cyber Security: How to Know What You Don't Know

    Sponsored by: Presidio Networked Solutions

    Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.

  • 2017 Will be an Exciting Year for IT

    Sponsored by: Splunk

    See what this year will hold for cloud, IoT and business analytics, IT operations and DevOps, machine learning, and security. Read on to learn how cloud success depends on the village, the lines between digital and physical will continue to blur due to IoT, 2017 will be a big year for analytics, and more.

  • LISTEN TO YOUR DATA Profiles of Customer Success With the Splunk® Platform

    Sponsored by: Splunk

    This e-book highlights a series of case studies that detail how a wide range of organizations have utilized the Splunk platform in real-world environments to solve problems, such as gain a better understand their digital audience, build a better business process, determine the highest value leads, and more.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security: A Developer's Viewpoint

    Sponsored by: Veracode, Inc.

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.

  • 3 Strategies to Keep Your Business Running Safely and Securely

    Sponsored by: Hewlett-Packard Enterprise

    In this infographic, discover 3 IT strategies for keeping your data both secure and accessible to your employees.

  • Managing Risks and Mitigating Threats in Today's IT Environment

    Sponsored by: TechData - HPE

    In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • How SAP Ensured Secure Application Production

    Sponsored by: TechData - HPE

    In this case study, learn the security strategy SAP used to find vulnerabilities in application code written in Java, C#, JSPs, and other languages. Find out how this helped them reduce cost to repair by fixing vulnerabilities early on, produce more secure code, and more.

  • Application Security Beyond SAST and DAST

    Sponsored by: Veracode, Inc.

    Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer.

  • 5 Lessons from an Application Security Pro

    Sponsored by: Veracode, Inc.

    Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.

  • Computer Weekly – 17 January 2017: RAC digitises roadside assistance

    Sponsored by: ComputerWeekly.com

    In this week's issue, we find out how roadside assistance company RAC acquired a software company and deployed cloud-based telemetry to deliver internet-connected car technology for older vehicles. We also investigate the IT security risks associated with IoT and look at best practices in rolling out workplace collaboration.

  • Unified Insights on One Unified Threat Management Market Product

    Sponsored by: WatchGuard Technologies, Inc.

    This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • How to Seamlessly Integrate Security Into DevOps

    Sponsored by: Veracode, Inc.

    Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.