ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • Empowering Business Innovation: Ricoh USA, Inc. Partners for Success

    Sponsored by: Dell SecureWorks

    In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • Building Robust Defenses with Limited Resources

    Sponsored by: Kaspersky Lab

    91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.

  • EDR: The Case for Automation and Simplification

    Sponsored by: Kaspersky Lab

    Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.

  • Selecting Your Next-Generation Firewall Solution

    Sponsored by: Fortinet, Inc.

    As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this white paper so that you may approach your CISO with a well-informed and compelling recommendation.

  • The Cloud Governance Playbook 2020

    Sponsored by: Rackspace

    The Cloud Governance Playbook 2020 provides readers with extensive guidance, best practices and recommendations as they relate to the modern barriers to cloud governance. Read on to leverage the expertise and findings from Rackspace & AWS’ research and ensure your organization is on track.

  • McAfee MVISION Cloud Security: 360° Shared Responsibility Model

    Sponsored by: Duo

    Shared responsibility models are a core pillar of any effective security and compliance strategy. However, despite awareness of the need, organizational adoption isn’t where it should be. Download this white paper for an in-depth look at the 360˚ Shared Responsibility Model, including a look at its core capabilities and adoption best-practices.

  • Incorporate Information Protection into Microsoft Teams from the Start

    Sponsored by: Nucleus Cyber

    Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.

  • Overcome 5 IoT Device Management Challenges

    Sponsored by: ARM

    As IoT devices proliferate every area of business, organizations need to ensure they're managing them and the network supporting them correctly. In this e-guide, learn how you can overcome the top 5 challenges of managing IoT.

  • Boost Hybrid Cloud Security

    Sponsored by: Red Hat

    As security evolves, so too do threats. In a world that is quickly moving to cloud architectures (94% of organizations are using some type of cloud), security has never been prioritized more. The cost-saving benefits of cloud are all proven, but without the right security, the risk is not worth the gain. Dive into this e-book to learn more.

  • CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper

    Sponsored by: Thales

    The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.

  • Stopping Zero Days at The Speed of Digital

    Sponsored by: Checkpoint Software Technologies

    Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.

  • Best Practices for Cloud Data Protection and Key Management

    Sponsored by: Thales

    In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).

  • CipherTrust Cloud Key Manager

    Sponsored by: Thales

    To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.

  • SecOps Cybersecurity Best Practice Guide

    Sponsored by: Covestic

    Cybersecurity incidents impact your bottom line. If you need evidence, Equifax’s breach cost them an estimated $4 billion in revenue. On a smaller scale, legal fees of cybersecurity litigation can cost about $2.5 million. The next step in your security journey may cost less than you think. Open this guide for 5 cybersecurity best practices.

  • University Hospital Gets the Most Out of Mobility with Total Access Control

    Sponsored by: PortSys

    For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.

  • Taking a Disruptive Approach to Security

    Sponsored by: VMware International Unlimited Company

    In a survey of 30 IT and security leaders across Europe, at least 73% said they found IT hygiene, finding security talent and integrating security products to be extremely challenging. The presence of these challenges means that leaders need to take an alternative, more disruptive approach to security. Open this e-book to learn specifics.

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    Sponsored by: Akamai Technologies

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Cyberattack Trends: 2020 Mid-Year Report

    Sponsored by: Checkpoint Software Technologies

    If your organization has come under attack since the outbreak of COVID-19, you are not alone. Cyberthreats are becoming more prominent than ever as a result of the spike in remote work, and if you’re not aware of which threats are lurking, another attack may be on the horizon. Read this report to get an understanding of what to look out for.

  • Enhancing the Modern Workplace with Hardware-Enforced Security

    Sponsored by: Servium

    An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition

    Sponsored by: CyberArk Software, Inc

    Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.