ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • 5 Top Recommendations for Effective Threat Detection

    Sponsored by: Alert Logic

    If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.

  • 5G, AI, Deepfakes and Beyond: The Future of IT and Security

    Sponsored by: Splunk

    The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.

  • 5th edition of the latest trends and insights for CIOs, CTOs and CDOs.

    Sponsored by: ComputerWeekly.com

    Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.

  • 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!

  • 6 Steps to Successful Capacity Management

    Sponsored by: BMC

    Inside this 12-page guide, uncover 6 IT infrastructure best practices that can help you smooth out capacity inconsistencies across your entire stack – including on-prem and cloud.

  • 9 Key Questions to Ask When Selecting an Incident Response Service Provider

    Sponsored by: Dell SecureWorks

    Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.

  • A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR

    Sponsored by: BigID

    With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.

  • A Computer Weekly buyer's guide to testing and code quality

    Sponsored by: ComputerWeekly.com

    Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.

  • A Guide to AIOps: The Future of IT Ops

    Sponsored by: Zenoss, Inc.

    Jump inside this guide to learn what features are baked into a modern AIOps toolkit – including which core IT layers use machine learning and which used algorithm-based predictive models.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • A guide to SIEM platforms, benefits and features

    Sponsored by: SearchSecurity.com

    SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • 8 Essentials of Business Analytics

    Sponsored by: SAS

    Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?

  • A Brazilian company adopts IBM System z to handle rapid business growth

    Sponsored by: IBM

    This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.

  • A CIO's Five-Point Plan for Managing Endpoint Security

    Sponsored by: Dell KACE

    Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.

  • A CIO's Top Priority

    Sponsored by: Rainforest QA Inc.

    Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly.

  • A Comprehensive Guide to Encryption Technology Approaches

    Sponsored by: Vormetric

    This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: SearchSecurity.com

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • A Hybrid IT Approach to Virtualization & DevOps Management

    Sponsored by: Red Hat

    Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.

  • A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls

    Sponsored by: Sophos

    Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.

  • A Manifesto for Cyber Resilience

    Sponsored by: Symantec Corporation

    In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.

  • A More Secure From Door: SSO and Strong Authentication

    Sponsored by: Imprivata

    This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.