ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:AT&T Cybersecurity

  • Closing the Mobile Security Gap

    Almost three quarters (72.6 percent) of internet users will access the web solely via their smartphones by 2025, equivalent to nearly 3.7 billion people. With this paper, contemplate the opportunities and the threats that come with increased mobility and explore what closing the gap means for the enterprise, no matter its size.

  • A Modern Architecture To Enable And Protect The Remote Workforce

    When it comes to remote work, organizations already know that legacy infrastructure isn’t up to the task. It’s time to assess solutions that are cloud-delivered to give your remote crowd secure access and a productive user experience. Download this white paper to learn about AT&T SASE with Palo Alto Networks.

  • The Forrester Wave™: Global Managed Security Services Providers, Q3 2020

    In this Forrester Wave report, take a closer look at the managed security services market, including a comprehensive evaluation of the today’s top vendors and their offerings. Read on to unlock the full report.

  • How To Achieve Risk-Based Vulnerability Management

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

  • The Essential Guide To Secure Web Gateway

    Download this white paper to better understand the secure web gateway and its place within your security stack.

  • Tightly Control And Manage Access To Applications And Services With Zero Trust

    In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.

  • IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment

    Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.

  • How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction

    Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.

  • Evaluator’s Guide For Managed Detection And Response (MDR) Services

    Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.

  • 5g And The Journey To The Edge

    With the many new ways to take advantage of low-latency, high-speed and reliability 5G is set to offer, how are organizations preparing cybersecurity practices, policies and procedures? The AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge examines global cybersecurity data and the future of computing.

  • How To Continuously Improve Risk Management Within Leading Cybersecurity Programs

    In order to overcome obstacles, many leading organizations turn to cybersecurity consultants to provide unbiased, expert advice and to augment their own staff expertise and resources in order to get over plateaus in the growth of their cybersecurity programs. Learn more by downloading this paper today.

  • Enable And Protect Your Remote Workforce

    Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.

  • Expert MSSP Panel: Top tips for building a successful practice in an age of remote working

    In the aftermath of the pandemic and the shift to remote work, MSSPs are suddenly in high demand. Dive into this webcast to hear security service experts explain their top tips for success during the age of remote working.

  • How to build a Security Operations Center (on a budget)

    A robust SOC requires skilled team members and the right technology to truly enhance security—and as an MSP, you can’t afford to let things slip through the cracks. Jump into this guide to learn how to piece together a Security Operations Center that can ensure airtight security protocols without breaking the bank—and without making compromises.

  • The AT&T Cybersecurity incident response toolkit: Putting the OODA loop to work in the real world

    In today’s cybersecurity climate, data breaches can seem like more of a “when” question than an “if.” Dive into this cybersecurity incident response toolkit to learn how to apply the military response principles of OODA—observe, orient, device, act—to your organization’s security strategy.

  • MSSP success checklist

    Download a copy of this checklist to find out what information you should be collecting from your customers as an MSSP.

  • The state of SIEM

    Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.

  • The Relationship Between Security Maturity and Business Enablement

    AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.

  • 5 Building blocks for strengthening your IT security program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

  • A guide to build vs. buy service models for threat detection and response

    Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

  • SIEM Analyst Research Bundle

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • PCI Compliance with Unified Security Management

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.

  • The Perfect Rx for HIPAA Compliance

    Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.

  • What You SIEM is What You Get

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences