ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Absolute Software Corporation

  • 5 Ways to Keep Remote Workers Secure and Productive

    Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.

  • 2020: The State of Endpoint Resilience Report

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

  • Implementing the NIST Cybersecurity Framework in Government

    Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.

  • CIS Critical Security Controls Evaluation Guide

    Download this CIS Evaluation Guide for best practices, benchmarks, and security controls that can help evaluate your current state of cyber hygiene and paths to improve cyber resilience.

  • Data Breach Response Revisited

    Download this e-book for the latest response requirements outlined by the world's strictest regulators and breach response best practices in accordance with the NIST Cybersecurity Framework.

  • Duarte Unified School District Protects Students while Fostering Student Engagement with Absolute Web Usage

    When students and teachers around the globe were asked to instantly adapt to a new distance learning phenomenon, the entire Duarte Unified School District turned to Absolute Web Usage to keep them secure during this time.

  • The Cost of a Data Breach in Healthcare

    Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.

  • CJIS Security Policy Evaluation Guide

    IT and Information Security teams need to be equipped with powerful, versatile tools that will allow them to increase their operational efficiency. Download this overview to see how Absolute helps protect regulated data, eliminate compliance failures, and respond rapidly to security exposures.

  • NIST Cybersecurity Framework Evaluation Guide

    Download this NIST Cybersecurity Framework Evaluation Guide to see where your organization stands in terms of cyber resilience.

  • Web Usage Reporting: Know How Much Time Is Spent Online & Where

    As the classroom goes digital, remote IT leaders are faced with a problem of visibility. Tap into this data sheet to learn how you can leverage Web & Rising Web Usage Report from Absolute to identify potentially harmful or unsafe web usage so you can take action.

  • Absolute for K-12 Education

    While school districts around the world are teaching and working remotely, cybercriminals are doing the same. Learn how Absolute Software enables K-12 IT leaders to remotely monitor and manage their entire fleet, ensuring the effectiveness and safety of remote learning programs.

  • Baltimore City Public School System Delivers Secure Technology to the Classroom

    The IT team of the Baltimore City Public School System was faced with the difficult task of ensuring that all school devices – and the sensitive data that they contained –were secured and accounted for. Learn how Absolute helped the school system reduce the risks and costs associated with laptop theft, ensure data protection on devices, and more.

  • Absolute Enables Personalized Learning Program at Loudoun County Public Schools

    Loudoun County Public Schools wanted to replace their desktops with tens of thousands of laptops. But they needed a solution that would help them prevent device theft and secure sensitive data. Learn how the implementation of Absolute gave the school district a peace of mind of endpoint security, device theft recovery, and data privacy.

  • Achieving HIPAA Compliance

    Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.

  • 3 Overlooked Data Privacy Considerations

    This e-book explores what personal privacy means in a ‘dematerialized’ world and draws attention to 3 aspects of data protection that often go overlooked. Read on to learn more.

  • Cybersecurity and Education: The State of the Digital District in 2020

    Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.