ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Rapid7

  • Evaluating Vulnerability Risk Management Providers

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • Application Security Buyer's Guide

    In the Application Security Buyer's Guide, discover the major features and capabilities you should be looking for when selecting a DAST tool. You will also find some questions and techniques you can leverage to get the most out of your evaluation period.

  • The Four Pillars of Modern Vulnerability Management

    In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.

  • Cybersecurity and Data Management in the Modern Digital Age

    In this definitive resource, discover over 150 pages of insights on the cyber and data threats facing every business, and how you can respond.

  • Security Orchestration and Automation Playbook

    Discover how security orchestration and automation helps teams improve their security posture and create efficiency – without sacrificing control of important security and IT processes.

  • Managed Detection and Response

    Rapid7's Managed Detection and Response (MDR) service offers a combination of expertise and technology to detect dynamic threats quickly across your entire ecosystem. In this service overview, learn more about Rapid7's MDR service and 5 key advantages the service offers.

  • A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls

    The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.

  • Industry Cyber-Exposure Report

    Rapid7's recently conducted a cybersecurity test to measure exposure and resiliency in the United Kingdom. They measured the Internet-facing security profiles of the FTSE 2501 plus a handful of non-FTSE 250 members. Explore the results in this report.

  • Security Information and Event Management (SIEM) Solutions

    As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.

  • The ROI of Security Orchestration and Automation

    Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.

  • Quarterly Threat Report Q4

    This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.

  • Security Automation Best Practices

    While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.

  • Security Orchestration and Automation Solutions

    One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.

  • Evaluating Vulnerability Assessment Solutions

    Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.

  • Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.