ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Streamlining Security Incident and Vulnerability Response

    Sponsored by: ServiceNow

    Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.

  • How Healthcare Benefits from Cloud-delivered Security

    Sponsored by: OpenDNS

    By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to deal with malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.

  • Focus: Securing new technology

    Sponsored by: ComputerWeekly.com

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • To Increase Downloads, First Instill Trust: Security Advantages of Code Signing

    Sponsored by: Symantec

    Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.

  • How Status Quo Creates Security Risk - The State of Incident Response

    Sponsored by: ServiceNow

    Learn what was found after the current practices and challenges associated with incident response processes and technologies are evaluated from thousands of respondents all over North America.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Why Code Signing Is an Essential Website Security Feature

    Sponsored by: Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

  • Understanding Shared Responsibility for Microsoft Azure

    Sponsored by: Alert Logic

    Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.

  • It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.

  • Answering 10 Essential Questions About Website Security

    Sponsored by: Symantec

    Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.

  • Cyber Attackers Follow Companies into the Cloud

    Sponsored by: Alert Logic

    Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.

  • Protected to Innovate: Securing Your Hybrid Cloud

    Sponsored by: Hewlett Packard Enterprise

    Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Get the Most out of your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Securing & enabling the Mac-empowered enterprise

    Sponsored by: Code42

    This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection

    Sponsored by: Code42

    With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.

  • Bringing IT and Security Together for Better Breach Response

    Sponsored by: ServiceNow

    Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.

  • Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey

    Sponsored by: Intel Security

    The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.

  • A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Learn how the disconnect between security and IT tools can lead to seemingly lackadaisical security responses to serious breaches. Access this resource to compare security response approaches, and get a short checklist to evaluate how the right security operations solution can support your enterprise.

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Your Blueprint to Securing Your Public and Hybrid Cloud

    Sponsored by: Fortinet, Inc.

    Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.

  • Defining Security for Today’s Cloud Environments

    Sponsored by: Fortinet, Inc.

    Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn what to look for when choosing the right hybrid cloud solution you and your enterprise, and why organization needs to augment traditional firewalls and security appliances with expanded protection.

  • Reeling in Ransomware Data Protection for You and Your Users

    Sponsored by: Code42

    In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.