ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:BlackBerry

  • HOW UES PROTECTS SHIFTING WORK ENVIRONMENTS.

    New security challenges stemming from the 2020 pandemic have heightened requirements for a unified endpoint security (UES) solution at many organizations. Read this report to unlock exclusive research into the endpoint security landscape, the impact of remote work, use cases for UES, and more.

  • BLACKBERRY VS. CONTI RANSOMWARE

    Access this video demo to observe an in-depth examination of 2 recent versions of Conti Ransomware attacks and how BlackBerry was able to defend against these attacks by preventing the malware from running.

  • BlackBerry Protect for Mobile Devices

    Mobile malware is more prevalent than ever, with attacks rising 50% in the last year alone. So, it is time to become protected with the AI-based security in BlackBerry Protect. Read on to learn how to monitor mobile malware attacks at the device and application levels to extend protection with no need for additional manpower.

  • Building a better relationship with Zero: Why Zero Trust needs a Zero Touch approach

    BlackBerry's Zero Trust model is built on the concept of minimal, or indeed zero, disruption – a framework known as 'Zero Touch'. This means utilizing AI to learn the users' behavior and usage patterns, and only challenging the user when they deviate from the learned model. Access this resource to learn more about Blackberry's Zero Trust model.

  • Securing Medical Technology Devices from 21st Century Cyber Criminals and Malware Attacks

    Over the past ten years, healthcare organizations have become the most targeted industry for cyber criminals, sustaining over 24% of all breaches. Learn about the benefits of the Blackberry Spark UES Suite including reduced risk against attacks such as zero-day threats and previously unknown malware.

  • Reap the Benefits of Bring Your Own: From Smartphones and Computers to Wearables and Smart Assistants

    The recent boom in remote workers has led to a subsequent rise in the use of personal phones, laptops and tables – also known as Bring Your Own (BYO) devices. This white paper provides exclusive insight into solving the key security challenges related to BYO device programs – read on to get started.

  • 2021 THREAT REPORT

    Access this BlackBerry 2021 Threat Report to examine the biggest cybersecurity events of last year and the security issues likely to affect the upcoming year.

  • Blackberry Video 2

    In this panelist discussion, join a quartet of cybersecurity experts from BlackBerry and AttackIQ as they provide expert insight and guidance related to MITRE ATT&CK Evaluations and the potential benefits they can yield. Watch now to get started.

  • Blackberry Video 1

    MITRE ATT&CK has become an effective tool in the war against advanced cyberthreats – but what exactly is MITRE ATT&CK, and how can you leverage it to make sure your security posture is resilient to threats like APT29? Watch this webinar to find out.

  • Engendering Trust Throught Endpoint Security And Management

    As organizations continue to embrace remote and digital business environments, establishing security and trust becomes more critical than ever. Read this expert infobrief from IDC to learn more about aligning security initiatives with the digital economy, the hierarchy of trust, and more.

  • Blackberry Intelligent Security. Everywhere. Decade Of The Rats

    Many organizations and government agencies around the world continue to be the targets of Advanced Persistent Threats (APT) groups acting in the interest of the Chinese government – sometimes referred to as Remote Access Trojans (RATs). Read this report for comprehensive insight into the tactics, tools and methods used by RATs.

  • Blackberry Video 3

    MITRE ATT&CK’s Evaluations are designed to provide your organization with a comprehensive, unbiased cybersecurity ‘health-check’. Watch this webinar to learn more about these evaluations and discover how to make the most out of them.

  • Blackberry Cyber Video

    According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.

  • What's New - BlackBerry Cyber Suite

    Today’s organizations are moving closer and closer to a zero-trust model, but with the power of AI, security operations centers can find even more context behind potential threats and incidents. BlackBerry’s Cyber Suite uses both, giving businesses a full spectrum of coverage, managed from a single console. Access this data sheet to learn more.

  • BlackBerry Cyber Suite

    In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.

  • Responding to public sector cyber security threats: Views of public sector professionals and where to from here

    If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.

  • InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks

    Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.

  • Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain

    Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.

  • How to Secure Your Remote Workforce Effectively

    Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.

  • State of Ransomware

    The increased reporting of cyber incidents among large companies in ANZ in the first half of 2020 has been evident. A handful of ransomware families are dominating these attacks. Browse this report to investigate some of the tactics used by these ransomware families, their high profile victims, and strategies used to defend against these threats.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • Reece Group Deploys BlackBerry Solutions To Protect Endpoints and Automate Threat Management

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Using Zero Trust to Enable Secure Remote Access

    As organizations continue to implement zero trust technologies, it’s critical to keep in mind that achieving an effective zero trust access control posture requires careful coordination and organization-wide buy-in. This SANS white paper offers additional expertise, including common challenges and key elements to consider.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences