ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Kaspersky

  • Facing up to complexity

    Complex incidents present very specific challenges that involve many aspects of the organization’s infrastructure that’s under attack. Within this paper, fully understand the 5 key barriers to successful complex incident resolution and how to deal with complex cyber-incidents caused by modern sophisticated threats.

  • The Forrester Wave™: External Threat Intelligence Services, Q1 2021

    With cyberthreats growing more advanced and complex, security pros are looking to external threat intelligence to enhance existing cyber defenses. It goes without saying – the vendors in this field are stacked, with effective services and management. View this Forrester Wave report to evaluate 12 vendors, including CrowdStrike and Kaspersky.

  • Safeguarding a Post-Covid Future

    Last year, organizations not only had to protect their workforce from a global pandemic, but a rise in cyberattacks too. This white paper overviews some of those key challenges, offers insight into how they may be addressed and explores how organizations should approach cybersecurity in the post-COVID era – read on to get started.

  • A buyer's guide to optimum level of security

    As cybercriminals come up with more sophisticated methods of stealing data, organizations need to upgrade their security practices to address these evolving threats. Read this endpoint detection and response (EDR) buyer’s guide to learn how to assess your security needs and choose the right EDR tool to ensure security.

  • Hunting the Hunters

    As more organizations leverage automation, more dependence relies on IT. In turn, risk management is shifting to IT, as hackers see information systems as more valuable targets. But a systemic approach to security can mitigate threats with less of a need for talent. View this white paper to learn about threat hunting.

  • Kaspersky Threat Intelligence

    Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.

  • The Evolution of Security Operations and the Contemporary State of Play

    According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.

  • Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment

    According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.

  • Kaspersky for Security Operations Center

    Many organizations are establishing Security Operations Centers (SOCs) to combat security issues as they arise, providing a swift response and a decisive resolution.In this white paper, learn about Kaspersky’s Security Training Program as well as their other advanced offerings that can help make your SOCs and security teams the best they can be.

  • Global expertise helps build a 2020 safer world

    In this white paper, learn about Kaspersky and their Advanced Persistent Threat (APT) Intelligence Reporting service.

  • Building robust defenses with limited resources

    91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.

  • EDR: The Case for Automation and Simplification

    Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.

  • SMB Cybersecurity: The Need for Better Protection

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

  • Remote Work Cybersecurity: Best Practices & Trends

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • Advanced Attacks are Catching On - Here's What you can Do

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Malware Analysis: How Some Strains 'Adapt' to Virtual Machines

    Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.

  • Cutting Complexity – Simplifying Security

    Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

  • IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Kaspersky Endpoint Security 8 for Windows

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • Overcoming virtualization security risks: Best practices

    Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.

  • Security For Virtualization: Finding the Right Balance

    While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • Take Back the Endpoint

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences