ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: SearchSecurity.com

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • SIEM IT Decision Center- Checklist #1

    Sponsored by: SearchSecurity.com

    If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

  • ISM Essentials Guide – Threat Management

    Sponsored by: SearchSecurity.com

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

  • Information Security Magazine - May 2012

    Sponsored by: SearchSecurity.com

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

  • April Essential Guide to Data Protection

    Sponsored by: SearchSecurity.com

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  • E-Guide: Identifying and addressing evolving threats

    Sponsored by: SearchSecurity.com

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

  • E-Guide: Steps to securing your file transfers and meeting compliance requirements

    Sponsored by: SearchSecurity.com

    Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.

  • How to create an effective data protection strategy for IT compliance

    Sponsored by: SearchSecurity.com

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • The various ways to fight new and emerging cybercrime

    Sponsored by: SearchSecurity.com

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: SearchCompliance.com

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • Go Daddy Sets a New Standard for SecureOnline Experiences

    Sponsored by: Trend Micro

    As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.

  • Application Visibility and Control

    Sponsored by: Aerohive Networks

    Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.

  • Information Security Magazine - April 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Network Security Technologies Technical Guide

    Sponsored by: SearchSecurity.com

    Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

  • Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them

    Sponsored by: eIQnetworks

    This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.

  • The path to securing your mobile Enterprise

    Sponsored by: Juniper Networks, Inc.

    This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • Compliance strategies for greater cyber security policies

    Sponsored by: HP Enterprise Security

    Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.

  • The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'

    Sponsored by: EMC Corporation

    In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.

  • Business Oriented Information Architecture

    Sponsored by: Sybase, an SAP company

    This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more.

  • Storage Data Protection Strategies In Today’s Data Center

    Sponsored by: Oracle Corporation

    An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

  • Information Governance: Audit and Protection on the IBM System z Platform

    Sponsored by: IBM

    Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.

  • Balancing compliance with information security threat assessment

    Sponsored by: IBM

    This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences