ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • 5 Stages of Incident Management and How to Improve Them

    Sponsored by: Atlassian

    Download this guide to learn about the five core stages of the modern incident management process – and why understanding the ins-and-outs of each stage is so important in today's world.

  • 5 steps to secure the enterprise and be fit for a flexible future

    Sponsored by: Avanade

    From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.

  • 5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud

    Sponsored by: Ionic Security

    In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.

  • 5th edition of the latest trends and insights for CIOs, CTOs and CDOs.

    Sponsored by: ComputerWeekly.com

    Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.

  • 6 Key Use Cases for Securing Your Organization’s Cloud Workloads

    Sponsored by: CyberArk Software, Inc

    In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.

  • 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!

  • 7 Key Steps to Developing an Audit-Ready Security Program

    Sponsored by: Ostendio

    In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.

  • 7 Ways to Take Cybersecurity to New Levels

    Sponsored by: Cisco Umbrella

    Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Data protection requires visibility of your network in order to understand where the likely risks lie and acting before they strike. As simple as it may sound, this can be a daunting task. These 9 steps will walk you through how to implement effective data protection controls. Read on to get started.

  • A Buyer's Guide to Cloud Security

    Sponsored by: Forcepoint

    Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.

  • A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR

    Sponsored by: BigID

    With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Thales

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

  • A Computer Weekly buyer's guide to testing and code quality

    Sponsored by: ComputerWeekly.com

    Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.

  • A cybersecurity professional's guide to securing a remote workforce

    Sponsored by: Forcepoint

    Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • 8 Essentials of Business Analytics

    Sponsored by: SAS

    Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?

  • A Brazilian company adopts IBM System z to handle rapid business growth

    Sponsored by: IBM

    This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.

  • A CIO's Five-Point Plan for Managing Endpoint Security

    Sponsored by: Dell KACE

    Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.

  • A CIO's Top Priority

    Sponsored by: Rainforest QA Inc.

    Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly.

  • A Comprehensive Guide to Encryption Technology Approaches

    Sponsored by: Vormetric

    This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: SearchSecurity.com

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.