ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • Application Encryption and Security

    Sponsored by: NetLib Security

    Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.

  • Application Security Risk Report

    Sponsored by: Micro Focus

    As organizations continue to embrace the productivity and collaboration benefits of business applications, it’s important to understand that hackers are constantly developing new techniques to exploit these applications. Download this research report for a comprehensive look at the trending attack methods and risks to keep an eye on.

  • AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements

    Sponsored by: Contrast Security

    The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.

  • Are you securing the right things? How to effectively secure your data

    Sponsored by: ComputerWeekly.com

    The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.

  • Armorblox shields enterprises from email-based social engineering attempts

    Sponsored by: Armorblox

    Email-based social engineering attacks remain a top threat to organizations. These attacks target users as their entry point for a breach, which traditional methods struggle to detect. In this white paper, take a closer look into Armorblox’s approach to email-based security by highlighting its key capabilities, use cases, and a SWOT analysis.

  • Artificial Intelligence in Cybersecurity

    Sponsored by: Spin Tech

    Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.

  • Assess and Manage Cryptographic Security with Entrust Datacard™

    Sponsored by: Entrust, Inc.

    In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.

  • Attacker Behavior Industry Report

    Sponsored by: Vectra AI

    While it can be helpful to look at attack vectors and specific threats, it’s also useful to examine the behavioral patterns of cyberattacker in order to better understand the attack lifecycle. Download this report the Vectra Attacker Behavior Industry Report, which looks at cyberattacks across industry, geography, company size and threat type.

  • Auditing Your Company’s Use of Open Source

    Sponsored by: Fossa

    As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.

  • Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks

    Sponsored by: Armorblox

    Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.

  • Australian Insurance provider establishes comprehensive risk management program

    Sponsored by: ServiceNow

    In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Auth0’s Approach to Information Security Identity in the Real World

    Sponsored by: Auth0

    Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.

  • Automating Your Vulnerability Remediation Process

    Sponsored by: Vulcan

    The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.

  • Avert Cyber Attacks with Proactive Endpoint Hardening

    Sponsored by: Automox

    The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • Architecting the Composable Enterprise

    Sponsored by: MuleSoft

    This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • Assessing Hyper-converged Infrastructures Based on Feature Capabilities

    Sponsored by: Pure Storage

    In this expert guide, 20-year industry veteran Jacob Gsoedl demonstrates how hyper-converged systems differ from traditional storage systems. Read on to get a run-down of the top considerations buyers should have on their checklist for evaluating, purchasing, and deploying HCI, and more.

  • Assessing Hyper-converged: Products, Scalability, and Ecosystem Support

    Sponsored by: Lenovo and Intel

    From the experts at SearchConvergedInfrastructure.com, this guide assesses several types of HCI architectures based on featured capabilities—including cost model, data protection, and resiliency. Read on to see the analysis, as well as to answer the burning question, "Why is the HCI definition so varied?"

  • Assessing the Value of Cloud Security Threat Intelligence Services

    Sponsored by: Hewlett Packard Enterprise

    This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.

  • AT&T Business Continuity Survey: 2008

    Sponsored by: AT&T Corp

    The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.

  • Automated Penetration Testing; Can IT Afford Not To?

    Sponsored by: Core Security Technologies

    This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.

  • Automating the IT Service Desk

    Sponsored by: ServiceNow

    Since its inception, the IT service desk has provided an intuitive portal designed to make it easier for users to get technical help – and for IT associates to keep on top of support workflows. So what happens when automation is thrown into the mix? Dive into this E-Guide to take a closer look.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.