ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Authentication Protocols Research

  • Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks

    Sponsored by: Fortinet, Inc.

    Secure Access Service Edge (SASE) and Zero Trust Network Architecture (ZTNA) can provide evolved threat protection on their own, but when put together, organizations can be remote ready during this unprecedented time. Read this blog post that details Fortinet’s acquisition of OPAQ, which will allow SASE to meet ZTNA.

  • Cloud Insiders - Risk and Compliance in the Hybrid Cloud

    Sponsored by: Xtravirt

    A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.

  • Secure, Cloud-Controlled Network to Enable Work From Home

    Sponsored by: CradlePoint

    When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.

  • 2020 SIEM Vendor Comparison Report

    Sponsored by: IBM

    Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."

  • Effectively Addressing Advanced Threats Survey

    Sponsored by: IBM

    Keeping up with these threats can be daunting—until we consider what it takes to defend against them. Not all threats are created equal—however, not all defenses are created equal either. This survey from SANS Institute, in partnership with IBM, uncovers how large, mature organizations deal with advanced threats.

  • 2019 Report for Identity Governance & Administration

    Sponsored by: IBM

    For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.

  • Complexity in Cybersecurity Report

    Sponsored by: IBM

    Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.

  • How to Secure Operational Technology

    Sponsored by: Fortinet, Inc.

    The consequences of a successful intrusion into operational technology (OT) are serious. In businesses that rely on operational and industrial production systems, the chief information security officer (CISO) must ensure that security teams have the right architectural defenses in place. Read this checklist for 7 considerations for securing OT.

  • Why & How to Merge Your SD-WAN and Security Strategies

    Sponsored by: SearchNetworking.com

    SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.

  • Selecting Your Next-Generation Firewall Solution

    Sponsored by: Fortinet, Inc.

    As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this NGFW white paper so that you may approach your CISO with a well-informed recommendation.

  • Taking a Disruptive Approach to Security

    Sponsored by: VMware International Unlimited Company

    In a survey of 30 IT and security leaders across Europe, at least 73% said they found IT hygiene, finding security talent and integrating security products to be extremely challenging. The presence of these challenges means that leaders need to take an alternative, more disruptive approach to security. Open this e-book to learn specifics.

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    Sponsored by: Akamai Technologies

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Lockdown Lessons: Closing Security Gaps

    Sponsored by: Webroot

    It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.

  • Now We’re All Working from Home, We Need to Become More Cybersecurity Aware

    Sponsored by: Kaspersky Lab

    Remote access, passwords, security awareness, cybersecurity, cyber-awareness, endpoint security: All are keywords and phrases that you need to prioritize if you haven’t already. They should be top-of-mind alongside trust, device management and patching. Browse this article for literature on the required increase in security and security awareness.

  • Research Shows IT Security Change Needed in Wake of COVID-19 Work-from-Home Move

    Sponsored by: Kaspersky Lab

    Employees are working remote, and there a large disparity between where secure access was before COVID-19 and where it needs to be now. Organizations cannot afford to leave their doors open when employees are behind their doors at home. Read this blog post for statistics on remote work and guidelines for protecting your network.

  • Types of Phishing Attacks You Need to Know to Stay Safe

    Sponsored by: Webroot

    Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.

  • Boost cybersecurity for remote working teams with system hardening

    Sponsored by: Kaspersky Lab

    Organizations have mandated that employees work from home. This means a higher risk of cyberattacks on businesses worldwide as well as more questions about cybersecurity, specifically endpoint security. If your endpoint security isn’t working as hard as it should, system hardening may be able to help. Read this article for an in-depth overview.

  • Privileged Access Cloud Security For Dummies

    Sponsored by: Thycotic

    Cloud breaches have increased to 24% of all breaches per the 2020 Verizon Data Breach Investigations Report. 77% of these breaches involved compromised user credentials. Enter privileged access management (PAM). Understanding PAM is essential in giving users easy, secure cloud access, and so browsing this e-book may be beneficial.

  • Mobile Security for the Remote Worker

    Sponsored by: Lookout

    In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.

  • Lockdown Lessons: Shoring up Your Network and Security Policies

    Sponsored by: Webroot

    Organizations have been required to create a sense of urgency around the review and possible rebuild of their network security. Indefinite remote work has placed architects in a fire storm, and without the proper defense and policy, your network could be in trouble. Read these 3 lockdown lessons to learn more.

  • Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive

    Sponsored by: Lookout

    IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.

  • Best Practices for Effective Remote Working

    Sponsored by: Orange Business Services

    Gartner reports that 41% of employees are likely to work remotely at least some of the time post-coronavirus. This means that organizations are going to have to make their remote strategies work for the long-term as well as the short. Browse this e-book for tips on collaboration and ways to effectively deploy remote access technology.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.