You've requested...

Download this next:

Infographic: 6 file transfer best practices

File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

These are also closely related to: "Symantec IM Manager"

  • Wie ExeonTrace Gesundheitsdaten vor Cyberangriffen schützt

    Gesundheitsdaten sind ein Hauptziel für Cyberkriminelle, die Schwachstellen im Netz oder in den Geräten ausnutzen können, um die Integrität der Daten zu gefährden. Deshalb ist es wichtig, einen umfassenden Überblick über das gesamte Netzwerk zu haben und dessen Aktivitäten auf Anzeichen von Bedrohungen zu überwachen.

    Die Solothurner Spitäler haben sich für ExeonTrace entschieden, eine Netzwerkerkennungs- und -reaktionslösung, die das Netzwerk auf Anomalien untersucht und die Sicherheitsteams alarmiert, damit diese Maßnahmen ergreifen können.

    Lesen Sie die vollständige Fallstudie, um mehr zu erfahren.

  • Jargon Buster Guide to Unified Communications

    As an industry buzzword, unified communications (UC) had its day several years ago. The integration of multiple communication tools – such as voice, video, instant messaging and presence technology – in the service of collaboration within the business is something that virtually every enterprise is now doing.

    Yet despite its mainstream status, the UC market continues to evolve as the digitisation of the enterprise gathers pace and new modes of doing business demand new modes of communicating and collaborating.

    In this e-guide, we will explore and define some of the key elements of a UC deployment, and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives: Paul Clarke from UC provider 3CX argues that the technology is still far from ubiquity, particularly when it comes to mobile deployments within the enterprise, while Sandra Gittlen delves a little deeper into this topic, and we will also find out how to consolidate disparate UC deployments within the business.

    Meanwhile, at Gitex 2017, the Middle East’s largest technology show, we met with Avaya, which is turning its focus back on its core UC business, and considering how UC can play a role in supporting projects that involve some more up-and-coming technologies, such as artificial intelligence, and even blockchain.

Find more content like what you just read:

  • Security as a service for MSP peace of mind

    Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.

    Download

  • A Computer Weekly buyer's guide to communications as a service

    As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • Two-factor vs. multifactor authentication: Which is better?

    Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.

    Download

  • Secure texting: The next great healthcare communications frontier

    In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Mobile security moving to a unified approach

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

    Download

  • Security outcomes for Zero Trust: Adoption, access, and automation trends

    Zero-trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer exist. Learn about some secrets to success in this Cisco white paper.

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • MicroScope – June 2023: Take a balanced approach to security

    In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not

    Download

  • Designing your Kubernetes security strategy

    Download this e-book to learn how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes.

    Download

  • Ensure the security of your endpoint devices: Expert tips

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

    Download

  • Unified Communication: “It should work as easily as a telephone call!”

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

    Download

  • CW APAC - November 2019: Expert advice on container security

    For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • CW APAC - March 2020: Expert Advice: Security Operations Centre

    In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

    Download

  • SME cyber security is increasingly a business imperative

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Decentralising datacentres: The new challenges of security at the edge

    In September 2020, the Computer Weekly Security Think Tank, our panel of information and cyber security experts, consideredthe challenges inherent in decentralising the datacentre, and set out to answer the question, how can security professionals ensure such setups are just as secure as the traditional centralised model? Read more in this e-guide.

    Download

  • Royal Holloway: Secure multiparty computation and its application to digital asset custody

    For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.

    Download

  • Southampton Solent University Invoice Processing Case Study

    Many organizations are still using manual invoice systems like spreadsheets which require manual input. This way of doing business is slow and inefficient and can create more costs than intended. For one University, they suffered under this exact scenario, but found that automation was the key. Read on to see who they partnered with to do it.

    Download

  • A Computer Weekly buyer's guide to SIEM and SOAR

    The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.

    Download

  • Infographic: SIEM vs. SOAR vs. XDR

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

    Download

  • How to Create a Mobile Device Security Policy, With Template

    In this eGuide, you will hear that a mobile security policy is vital to securing an organization's work environment by defining potential risk factors. Take this brief survey about your current mobile security challenges to get access to this guide!

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

    Download

  • Infographic: 2019 Europe IT Priorities - Security

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • 12 essential features of advanced endpoint security tools

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

    Download

  • CW APAC, April 2022: Trend Watch: Cyber security

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

    Download

  • SIEM, SOAR or both? Our security experts weigh in

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • CW ASEAN: Trend Watch – Security

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

    Download

  • Protecting your organisation from itself

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

    Download

  • Zero trust: Taking back control of IT security

    In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.

    Download

  • European Perceptions, Preparedness and Strategies for IoT Security

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

    Download

  • What Is The Next Step For Next-Gen Antivirus?

    Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.

    Download

  • MicroScope – February 2021: The forecast on channel security

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

    Download

  • Containers: Making security and business sense

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

    Download

  • 5 endpoint security best practices

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

    Download

  • CW EMEA - November 2023: Let the data flow

    In this month's CW EMEA ezine, we find out about Heineken's mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform. Read the issue now.

    Download