ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget Security

  • WLAN Access Control and Wi-Fi Network Needs

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

  • Taking Action to Secure Web Applications

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

  • Solving the Challenges of BYOD

    This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.

  • Unlocking the Opportunity of SIEM Technology

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

  • The Improvement and Evolution of SIEM

    Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.

  • PCI compliance in the cloud: Can cloud service providers manage PCI?

    Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.

  • PCI Council issues mobile application rules for software developers

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • The Future of Next-Generation SIEM

    This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!

  • How a next-generation firewall prevents application-layer attacks

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

  • Security Information Management Systems and Application Monitoring

    Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!

  • Improving Enterprise Email Security: Systems and Tips

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Six Email Security Best Practices for Email SaaS

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors

    This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture.

  • The Top 4 Business Considerations for Your UC Solution

    Get help determining your organization's unified communications needs in order to make a more informed solution purchasing decision.

  • Enterprise Social Tools Need UC Integration to Thrive

    This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide.

  • UC and the Evolution of Enterprise Telephony

    This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).

  • The Evolution of Collaboration: Tying the Knot with UC

    In this E-Guide from SearchUnifiedCommunications.com, we explore the evolving relationship between unified communications (UC) and collaboration and explain why UCC is a match that can benefit any organization.

  • How to Thwart Privilege Creep with Access Reviews

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

  • Mobile Application Management in the BYOD Era

    This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.

  • Threat Detection (Antivirus Intrusion Prevention)

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • May Information Security Magazine

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • Email Security Technical Guide

    Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.

  • Information Security Magazine - April 2013

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Network Security Technologies Technical Guide

    Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.