ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • Security Big Data: Preparing for a Big Data Collection Implementation

    Sponsored by: TechTarget Security

    This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.

  • The Improvement and Evolution of SIEM

    Sponsored by: TechTarget Security

    Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: TechTarget Security

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks

    Sponsored by: TechTarget Security

    This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!

  • Six Email Security Best Practices for Email SaaS

    Sponsored by: TechTarget Security

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: TechTarget Security

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • SIEM IT Decision Center- Checklist #1

    Sponsored by: TechTarget Security

    If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

  • Security University: Data Loss Prevention

    Sponsored by: TechTarget Security

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Bring Your Own Security to the Cloud

    Sponsored by: CenterBeam

    Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

  • Where BCDR and GRC Come Together: A CIO's Guide

    Sponsored by: Essextec

    In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.

  • Network Security Visibility and Analysis Technical Guide

    Sponsored by: TechTarget Security

    This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.

  • Computer Weekly – 11 June 2013: Do you know who is on your network?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at how identity and access management can improve your information security. We go behind the scenes at Microsoft HQ to find out how the software giant deals with product security. And the CIO from Domino's Pizza tells us why the retailer is moving to the cloud. Read the issue now.

  • Enterprise Mobility Management Options to Keep Corporate Data Safe

    Sponsored by: MobileIron

    This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.

  • Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.

    Sponsored by: Insight

    Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.

  • Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You

    Sponsored by: Insight

    Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.

  • A special issue covering the information security market

    Sponsored by: MicroScope

    A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.

  • Information Lifecycle Governance Leader Reference Guide

    Sponsored by: IBM

    Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: TechTarget Security

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • Go Daddy Sets a New Standard for SecureOnline Experiences

    Sponsored by: Trend Micro

    As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.

  • Application Visibility and Control

    Sponsored by: Aerohive Networks

    Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.

  • Information Security Magazine - April 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Network Security Technologies Technical Guide

    Sponsored by: TechTarget Security

    Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

  • Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them

    Sponsored by: eIQnetworks

    This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.