ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Security Software Research

  • Your IoT-driven Future

    Sponsored by: Vodafone

    In this 2019 IoT barometer report, discover the benefits of investing in IoT as well as tools for comparing how you are doing relative to other companies like yours.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • CW Benelux August 2017

    Sponsored by: ComputerWeekly.com

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • Managing Web Security in an Increasing Challenging Threat Landscape

    Sponsored by: SearchSecurity.com

    This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • Flushing Bank Invests in Internet Security with Webroot

    Sponsored by: Webroot

    New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

  • FISMA Compliance: A Holistic Approach to FISMA and Information Security

    Sponsored by: IBM

    IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.

  • BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security

    Sponsored by: IBM

    Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Building Blocks of Transparent Web Security: Server-Gated Cryptography

    Sponsored by: VeriSign, Inc

    Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.

  • Internet Security and Acceleration Server 2006

    Sponsored by: Microsoft

    ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.

  • How to Offer the Strongest SSL Encryption for your Company

    Sponsored by: VeriSign, Inc

    Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.

  • Encompass Writes New Prescription for Security with Check Point

    Sponsored by: Check Point Software Technologies Ltd.

    Encompass Medical Group found a turnkey HIPAA comliant Internet security solution by installing VPN-1 SmallOffice from Check Point Software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.