ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.

  • Container Security: How to Secure Enterprise Container Stacks

    Sponsored by: NeuVector

    Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Three Golden Rules for Safe and Sound Endpoints

    Sponsored by: IBM

    Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.

  • Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs

    Sponsored by: IBM

    Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.

  • Are You Leaving the Door Open for Cyber Threats?

    Sponsored by: Palo Alto Networks

    In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.

  • The Cyber Threat Guide

    Sponsored by: LogicNow

    This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it: eliminated false positive message classification, reduced IT help tickets, improved general email security, and assumed granular control over spam and bulk mail classification within Office 365.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • 5 Questions to Ask Data Protection Vendors

    Sponsored by: Commvault

    Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.

  • Trends in Mobile User Authentication

    Sponsored by: HID

    Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.

  • Important Modern Trends in Digital Banking

    Sponsored by: HID

    Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)

  • Why Digital Business Needs a New Approach to Information Security

    Sponsored by: Entrust, Inc.

    This resource details how companies are turning to new technologies which establish identity and promote trust in order to extend the reach of their digital businesses. Further, you will learn about today's security environment as it exists inside and outside of the office.

  • CW ANZ - December 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.

  • How Many Network Connected Medical Devices Does Your Organization Have?

    Sponsored by: Zingbox

    IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them.

  • Important Considerations for Comparing Data Protection Vendors

    Sponsored by: Commvault

    What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Banking Security in Today's Mobile World

    Sponsored by: HID

    This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now.

  • What to Look for in Incident Response Management Tools

    Sponsored by: SearchSecurity.com

    Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital.

  • Facts About the Cloud

    Sponsored by: Sage Live

    By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology.

  • Give Them Access. NOT a VPN

    Sponsored by: Bomgar Corp.

    Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk.

  • Building the Business Case for Strong Authentication

    Sponsored by: HID

    With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.