ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • 10 Capabilities to Look For in an MDR Solution

    Sponsored by: Arctic Wolf Networks, Inc.

    Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.

  • 2018 Global Study on Application Security

    Sponsored by: Arxan

    Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.

  • 2018 Incident Response Insights Report

    Sponsored by: Dell SecureWorks

    In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.

  • 2019 Cybersecurity Report Card

    Sponsored by: DomainTools

    If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.

  • 2019 State of the Firewall

    Sponsored by: FireMon

    The gap between innovation and security can lead to errors, accidental exposure, or service disruptions. In this 2019 state of the firewall infographic, learn why network security risk is at an all-time high and more.

  • 2019 Trustwave Global Security Report

    Sponsored by: Trustwave

    Every year, Trustwave releases a Global Security Report that highlights the common cyberattack trends across the year in order to provide organizations with key insights and real-world data so they can be better prepared. Download this report to read through the 2019 Global Security Report.

  • 2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence

    Sponsored by: Cisco Umbrella

    As technology enables organizations to improve the way they do business, the cybersecurity landscape evolves to reflect this change – both in terms of cyberattacks and security tactics. This e-book highlights the top cybersecurity trends of 2020, designed to guide organizations towards a secure network, today and in the years to come.

  • 22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.

    Sponsored by: ComputerWeekly.com

    In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.

  • 3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)

    Sponsored by: OneLogin

    Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.

  • 4 Actions to Secure Work from Home Employees

    Sponsored by: Ping Identity Corporation

    Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.

  • 4 Reasons to Add UBA to Your SIEM

    Sponsored by: Splunk

    To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.

  • 4 Reasons to Replace Your Traditional Storage with Hyperconverged Infrastructure

    Sponsored by: Comport Consulting

    This blog post outlines 4 reasons motivating organizations to migrate from their legacy storage to robust hyperconverged infrastructure (HCI) models. Read on to determine if your enterprise could similarly benefit from HCI.

  • 4 Steps to Cloud Access Management

    Sponsored by: Thales

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • 5 Essential Elements of a Comprehensive Endpoint Security Strategy

    Sponsored by: Cyber-Ark Software

    Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.

  • 10 Essential Elements for a Secure Enterprise Mobility Strategy

    Sponsored by: Citrix

    This resource guides you through the top 10 considerations when developing a mobile strategy.

  • 10 Must Haves for Secure Enterprise Mobility

    Sponsored by: Citrix

    In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.

  • 10 Network Security Tools and Tests Everyone Should Use

    Sponsored by: Global Knowledge

    This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.

  • 10 Steps for Early Incident Detection

    Sponsored by: Tripwire, Inc.

    The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  • 10 Ways to Build a Better Big Data Security Strategy

    Sponsored by: Hewlett-Packard Enterprise

    This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.

  • 18 Windows 10 Facts IT Must Know

    Sponsored by: VMware

    Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.

  • 2014 Magic Quadrant for User Authentication

    Sponsored by: SafeNet Asia Ltd

    View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.

  • 3 Big data security analytics techniques you can apply now to catch advanced persistent threats

    Sponsored by: Hewlett Packard Enterprise

    In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • 4 Secrets to Meaningful Security Discussions with the Board of Directors

    Sponsored by: Citrix

    This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.

  • 5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing

    Sponsored by: APTARE

    In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.