ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:SearchSecurity.com

  • Moving Beyond Ad Hoc Mobile Security

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Moving Past the Password? Not So Fast

    The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.

  • Evolving Endpoint Security Controls for Effective Threat Protection

    Many security experts feel endpoint security controls no longer work against today's hackers and attackers. But the reality is that you may not be deploying or using your controls correctly. This Endpoint Security Resource Center provides 5 lessons and a quiz that can help to evolve your endpoint security protection.

  • Information Security Magazine: Insider Edition

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • What to Look for in Secure Sockets Layer

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Is It Time to 'Software-Define' Your Network Security?

    This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    This issue of Information Security magazine uncovers cloud data loss prevention (DLP) strategies and whether CASBs can offer another layer of protection. Additionally, learn about the Cybersecurity National Action Plan and the readers' top picks for endpoint protection software.

  • What to Look for in Multifactor Authentication Tools

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • What to Look for in Endpoint Antimalware Tools

    Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.

  • Stay in Sync, Securely

    Secure file sync and share can be achieved in your enterprise. In this three-part guide, our security experts explain how.

  • SOC Analyst in a Box

    Discover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.

  • Monitoring that Cloudy Network

    Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud. In this guide, learn how to adapt and advance your security monitoring efforts.

  • Under Attack? 2016 Defenses Escape Compromise

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • What to Look for in Multifactor Authentication Tools

    In our threat-laden environment, multifactor authentication tools are a critical defense. Learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Threat Monitoring in Tough Times

    Today's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.

  • Resolve to Revitalize Your SIEM Security

    This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.

  • Swiss Army Knife Security? How to Vet Integrated Tool Sets

    In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.

  • API Security Now

    Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.

  • Information Security Magazine: November Issue

    What strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?

  • "Hacking as a Service," and Other Emerging Threats

    Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.

  • What to Look for in Vulnerability Management

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

  • Endpoint Security in this Interconnected Age

    This vendor-agnostic handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security before the next big hack attack. Discover why the key to endpoint protection may be in the cloud, the benefits of an integrated endpoint security suite, and more.

  • Information Security Magazine: October Issue

    In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.

  • Global Threats and an Intelligent Response

    In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.