ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Executing on NIST SP 800-190

    Sponsored by: Twistlock, Inc.

    When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.

  • Thinking Inside the Box: Preventing Fraud From the Inside Out

    Sponsored by: Riskified

    One of the first steps of preventing shipping fraud is figuring out how fraudsters get their hands on stolen goods in the first place. Download this e-book to learn about the methods fraudsters use and how knowing them can help retailers prevent future incidents.

  • Making Sense of Mismatches

    Sponsored by: Riskified

    In some cases, the presence of a mismatch translates to an instant red flag. But that is not always the case. This eBook provides insight into the most common types of mismatches found in good orders, including a deeper look at industry specific patterns, and how to handle them.

  • Advanced Data Protection Now Within Reach for Mid-Market Companies

    Sponsored by: InteliSecure

    Robust security programs are more accessible, affordable, and capable than ever before, helping confront a deluge of new regulations and cyberthreats for mid-market companies, today. Download this white paper to see the real benefits of Managed Security Services.

  • Quantifying Business Risk to Optimize Data Security

    Sponsored by: InteliSecure

    Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.

  • Report: Securing the Enterprise Against Cyberattacks

    Sponsored by: Akamai Technologies

    71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.

  • Disaster Recovery/Business Continuity: Spotlight on ANZ

    Sponsored by: IBM

    In this e-guide, read about the IT outage at Woolworths that shut down checkouts and forced shoppers to leave their groceries behind, what you can do to avert a disaster through a recovery plan and the top business continuity risks you should be aware of this year.

  • The Hotel Hijackers

    Sponsored by: Panda Security

    Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.

  • Your Guide to Integrated Risk Management Vendors

    Sponsored by: ServiceNow

    In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.

  • 3 Secrets to Becoming a Mobile Security Superhero

    Sponsored by: Symantec

    Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.

  • Report: Financial Services Threat Landscape

    Sponsored by: IntSights

    Prepare your organization for the future of cyberthreats. This white paper covers 5 cybersecurity predictions for 2019, global trends in cybersecurity, and much more.

  • How to Reduce Your Organization's Digital Attack Surface & Cyber Risk

    Sponsored by: IntSights

    Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.

  • Your People are Your Biggest IT Security Threat

    Sponsored by: Rackspace Microsoft

    Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.

  • AI and Machine Learning in Your Organization

    Sponsored by: Splunk

    With machine learning-powered initiatives, you can detect issues before they paralyze your business. Download this resource for more on where you can apply machine learning and AI for insights.

  • Making Intelligent Decisions about Identities and their Access

    Sponsored by: IBM

    Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.

  • A Guide to Fraud in the Real World

    Sponsored by: Splunk

    In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.

  • Podcast: The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance

    Sponsored by: IntSights

    Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.

  • The Salesforce Data Protection Guide

    Sponsored by: Druva Software

    Most organizations make the incorrect assumption that Salesforce has redundant and easily accessible copies of their data, and they don't need any additional data protection. Download this white paper to learn 5 reasons why you should integrate Salesforce with a cloud data protection system.

  • Pure Storage Case Study: Man AHL

    Sponsored by: Pure Storage

    Download this case study to see how investment business Man AHL delivered the massive throughput and scalability required to meet its most demanding simulation apps with an all-flash architecture, resulting in 20x processing improvement, 600,000 IOPS, and 6GBs bandwidth.

  • The Internet Never Forgets: How to Reduce Your Organization's Attack Surface and Cyber Risk with Digital Risk Reconnaissance

    Sponsored by: IntSights

    Join guest speakers, Nick Hayes, Forrester's Senior Security and Risk Analyst, along with Alon Arvatz, Chief Product Officer and Co-Founder of IntSights, for a discussion on the importance of Digital Risk Protection for enterprise security, compliance and risk teams.

  • Data Secret Revealed: A Collection of Security Customer Stories

    Sponsored by: Splunk

    Find out how several prominent organizations, such as Duke University, Discovery, Inc., the U.S. Federal Department, and the city of Los Angeles, upgraded to a SIEM platform and gained powerful security analytics insights.

  • A Modern Approach to Securing Your Hybrid Cloud

    Sponsored by: Dimension Data

    In this e-book, find out how you can deliver automated and elastic security to keep assets and data protected in a hybrid cloud environment.

  • Getting Started with Vulnerability Mitigation

    Sponsored by: Kaseya

    Find out which applications are most vulnerable to your enterprise and modernize your software and vulnerability management strategy today.

  • The Forrester Wave: Risk-Based Authentication

    Sponsored by: IBM

    Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.

  • The Forrester Wave: Risk-Based Authentication

    Sponsored by: IBM

    Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.