ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Amp Up Your Endpoint Data Security

    Sponsored by: Dell and Microsoft

    More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.

  • Successfully migrating personnel data

    Sponsored by: Accenture

    Data migration, something only done when required, carries great potential risk to data integrity and inconsistency increases. Read on to learn about a data migration management solution that enables versatility and confidence in the face of a task that puts your data at risk.

  • Cybersecurity Buyer's Guide

    Sponsored by: Palo Alto Networks

    Inside you'll find criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

  • Securing Windows XP with Traps and Advanced Endpoint Protection

    Sponsored by: Palo Alto Networks

    Locate a way to continue using Windows XP even though its end-of-life has passed. Using a lightweight security client you can keep your legacy systems viable even longer.

  • Interoperability and the Cloud in Connected Health

    Sponsored by: CloudMine

    Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.

  • A letter from the CEO: Connected Health Cloud Release

    Sponsored by: CloudMine

    If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • Accelerating the Building, Managing, and Deployment of Healhcare Apps

    Sponsored by: CloudMine

    Discover how your healthcare organization can reduce initiative time to market by up to 70% and create a multimedia app compatible with almost any device to contain the overflow of patient information that is received every day.

  • 5 Benefits of Building Apps for Healthcare

    Sponsored by: CloudMine

    In this infographic discover 5 benefits of building applications for healthcare, including secure and HIPAA compliant communication, increased interoperability, and more.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Case Study: Virtualization Strengthening Security

    Sponsored by: emc first distribution

    Learn how a government agency with very particular needs boosted performance for its systems that were struggling to secure a growing volume of important data on physical workstations.

  • China-Based eCommerce Site Hits the Target in Fraud Detection and Sales Growth

    Sponsored by: CyberSource

    Discover how you can prevent fraud loss, and boost sales by enabling legitimate transactions. This short resource discusses how a China based eCommerce site Banggood fortified itself against fraud with a new unified platform.

  • Health Care Security Is Personal: Act Now to Protect Patient Care

    Sponsored by: Optum

    In this white paper, learn how health care organizations can successfully manage threats and vulnerabilities in this ever-evolving landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.

  • MetroDeal Securing Success, Managing Fraud

    Sponsored by: CyberSource

    Learn how one organization secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit.

  • IBM Security QRadar: SIEM Product Overview

    Sponsored by: IBM

    In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.

  • 6 Critical Trends in Smart Healthcare Technology

    Sponsored by: Avaya

    Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • Four Steps to Being More Mobile Than Ever

    Sponsored by: Dell, Inc.

    Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Wireless Defense Strategies in the IoT Era

    Sponsored by: Fortinet, Inc.

    As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.

  • The Adaptive Security Platform: Secure the Modern Data Center

    Sponsored by: Illumio

    Data centers have evolved, and traditional security platforms no longer make the cut. In this e-guide, you'll find an interview that SearchNetworking conducted with two security gurus from Illumio on their latest security platform, that also happens to be a winner of our Network Innovation Award.

  • Computer Weekly Developer Cloud and Mobility Planning Kit

    Sponsored by: Microsoft

    The intersection of two huge technology zones like cloud computing and mobility are bound to be hot, and it can also be challenging for app developers and planners. Computer Weekly, in this development special, has put together four comprehensive pieces of content that are set to help with all your cloud computing and mobility needs.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

  • When to Adopt the Lift-and-Shift Cloud Migration Model

    Sponsored by: New Relic

    This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.