ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The top threat intelligence services for enterprises

    Sponsored by: UnitedLex

    If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.

  • Cybersecurity Risks Masked by Controversial Vulnerability Counts

    Sponsored by: Symantec Website Security

    In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.

  • Can A Subscription Ease SSL Certificate Management?

    Sponsored by: Symantec Website Security

    This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.

  • Open Source Strategies Spark Security and Integration Concerns

    Sponsored by: Black Duck Software

    In this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.

  • Find the Right EFSS to Secure Employee File Sharing

    Sponsored by: Trend Micro, Inc.

    This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.

  • Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability

    Sponsored by: Symantec Website Security

    In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.

  • Broadening Your VDI Horizon Beyond Thin Client Devices

    Sponsored by: Dell, Inc. and Intel®

    This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.

  • Why it's Time for Locked-Down Desktops

    Sponsored by: Dell, Microsoft and Citrix

    Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell, Inc. and Intel®

    This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell, Microsoft and Citrix

    This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • Computer Weekly – 1 December 2015: Balancing speed and risk in IT projects

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.

  • "Hacking as a Service," and Other Emerging Threats

    Sponsored by: SearchSecurity.com

    Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.

  • What to Look for in Vulnerability Management

    Sponsored by: SearchSecurity.com

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: SearchSecurity.com

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Is it time for a DLP system in your enterprise?

    Sponsored by: SearchSecurity.com

    Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Fighting Cybercrime in the 21st Century

    Sponsored by: SearchSecurity.com

    Strengthen your security with these expert insights into fighting advanced crimeware.

  • Next-Generation Security in a Mobile Era

    Sponsored by: SearchCIO.com

    Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.

  • The Essential Guide for Threat Intelligence Services: What to Look For

    Sponsored by: SearchSecurity.com

    This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.

  • CIO Decisions E-Zine - February 2015

    Sponsored by: SearchCIO.com

    When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.

  • The Bot Threat

    Sponsored by: Hewlett Packard Enterprise

    In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.

  • Cost of a Breach Rising; How to Protect Against It

    Sponsored by: TaaSera

    This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.