ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • The State of Open Source Software: Vulnerability Risks are on the Rise

    Sponsored by: Flexera Software

    Open source software (OSS) is an integral part of business for app developers today, but they can cause security risk and compliance issues. Learn about the current state of OSS and how you can ensure that your organization remains secure and compliance standards are met.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell and Microsoft

    In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.

  • How to Bridge the SIEM Alert Triage Gap

    Sponsored by: FireMon

    Security teams are buried under the sheer amount of alerts, making it impossible to investigate them all.

  • How to Tackle the Three Biggest Barriers to Business Mobility

    Sponsored by: Citrix

    29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business.

  • Outbound Gateway Protection with UTM on AWS

    Sponsored by: AWS - Sophos

    AWS is popular for the wealth of benefits it offers users, but a vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure. Access this white paper to learn about protecting your AWS environment with unified threat management.

  • Reducing Risk and Increasing Flexibility for the Mobile Enterprise

    Sponsored by: Citrix

    Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.

  • Your Guide to Vendor Risk Management Visibility

    Sponsored by: Rsam

    Don't end up in the headlines because a vulnerable vendor exposed your data to risk. Learn how to solve the vendor risk equation and mitigate the threat they pose to your organization.

  • Securing the Cloud for the Modern Enterprise

    Sponsored by: OneLogin

    In this extensive, 47-page e-book explore how identity management can streamlines access to the cloud while protecting corporate data, reducing dependence on IT, and minimizing disruption.

  • Understanding the Security Leaders' Plight

    Sponsored by: Dell SecureWorks

    When business leaders and security pros aren't communicating with each other, breaches can happen. Learn the 13 areas of IT security where cooperation between both teams is essential.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • 4 Critical Elements of a Successful GRC Implementation

    Sponsored by: Rsam

    The GRC landscape is changing quickly. If your organization finds itself at a turning point of homegrown systems becoming obsolete, it's important to know how to adapt. Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • Reducing Risk and Increasing Flexibility for the Mobile Enterprise

    Sponsored by: Citrix

    Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • GDPR and Citrix ShareFile

    Sponsored by: Citrix

    The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.

  • The Case for Cloud-Based IAM

    Sponsored by: OneLogin

    What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.

  • IAM: On-Premises vs. IDaaS Delivery

    Sponsored by: OneLogin

    Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.

  • 7 Ways to Improve Your Security Incident Response

    Sponsored by: Rsam

    There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.

  • Case Study: Groundbreaking Workforce Development Enabled by AWS

    Sponsored by: AWS - Sophos

    The Louisiana Department of Corrections (DOC) needed a secure way to provide online courses for inmates, ensuring that they stayed in the designated virtual environment. Access this case study to see how the DOC was able to launch the secure AWS environments they needed to put inmates on the path to career success.

  • Is the Endpoint Security Nightmare Ending?

    Sponsored by: SearchSecurity.com

    The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be.

  • 5 Questions Executives Should Be Asking Their Security Teams

    Sponsored by: Microsoft

    This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell and Microsoft

    Click inside to find the major trends and drivers forcing organizations to change or adopt new security procedures in the wake of evolving threats.

  • 3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

    Sponsored by: Citrix

    When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.

  • 3 Ways EFSS Enables Secure Content Collaboration

    Sponsored by: Citrix

    The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.

  • How to Secure Your Organization's Data in SaaS Apps

    Sponsored by: OneLogin

    According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.