ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Open Source Risk – Fact or Fiction?

    Sponsored by: Flexera Software

    Many new enterprise technologies are centered around open-source technology. This resource explores the risks involved with open-source software and how your enterprise can remain secure.

  • Magic Quadrant for Intrusion Detection and Prevention Systems

    Sponsored by: Alert Logic

    Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers like Hillstone Networks, Alert Logic, Cisco and more to help you choose the right network security solution to meet your business need.

  • It's Time to Take a Proactive Approach to Threat Detection and Prevention

    Sponsored by: IBM

    According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • The Security Benefits of DLP

    Sponsored by: InteliSecure

    Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.

  • Security Considerations and Best Practices for Securing Containers

    Sponsored by: Tenable

    Security and risk management leaders must address container security issues around vulnerabilities, visibility, compromise and compliance. Take a look at this Gartner report to uncover security considerations and best practices for securing containers.

  • Magic Quadrant for SIEM

    Sponsored by: IBM

    Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's security information and event management (SIEM) products as well as a market overview.

  • Wimbledon Increases Security to Focus on the Court, not the Cloud

    Sponsored by: IBM

    The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.

  • Vendor Assessment: Print and Document Security

    Sponsored by: HP

    This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.

  • Trends in Hybrid Cloud Security: Minding the Gap

    Sponsored by: Aqua Security

    According to an ESG survey of security pros worldwide, 80% of organizations will use containers in their production environments by 2020. Explore this resource to learn about trends, challenges, and future plans of hybrid cloud and container security.

  • SIEM Mid-Market Analysis

    Sponsored by: AlienVault

    SIEM serves 3 important functions: proving compliant practices, formalizing data storage, and initiating breach investigation. Explore this Frost & Sullivan Mid-Market Analysis to uncover how vendors stack up with their SIEM strategies.

  • Integrated Threat Management for Dummies

    Sponsored by: IBM

    Every industry sector has been hit hard by hackers and cybercriminal organizations. Explore this For Dummies e-book to uncover threat management tactics to enhance your security operations and response strategy to protect your enterprise in the era of constant attacks.

  • Security for Containers – 5 Things DevOps Need to Do

    Sponsored by: Aqua Security

    For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.

  • Complete Guide to Enterprise Container Security

    Sponsored by: Aqua Security

    There has been an explosive growth of containers. So, what are the primary threats to container environments? Explore this guide to uncover how to assemble an effective container security program to protect against the looming threats.

  • Frequently Asked Questions: Spectre & Meltdown

    Sponsored by: enSilo

    How is your enterprise protecting your servers, devices, and cloud against malware and vulnerabilities? Explore this Q&A resource to gain insight into the vulnerabilities of Meltdown and Spectre and how to defend against them.

  • Global Application and Network Security Report

    Sponsored by: Radware

    Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.

  • Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy

    Sponsored by: Wombat Security Technologies

    Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.

  • Case Study: Sports Industry Company Overcomes Cybersecurity Issues

    Sponsored by: enSilo

    Take a look at this case study to uncover how a company within the sports industry overcame the issue of falling victim to damaging cyberattacks causing downtime by implementing a security strategy with limited resources.

  • Food & Beverage Security Case Study

    Sponsored by: enSilo

    Companies are beginning to realize that the traditional AV is not enough to protect their data from the ever-changing threat landscape. Explore this case study to gain insight into how a beverage company was able to overcome their issue of preventing ransomware attacks.

  • Ransomware Security Protection

    Sponsored by: enSilo

    The constant modification of ransomware variants is causing a severe threat for financial institutions worldwide. Take a look at this resource to uncover a malware protection security strategy to ensure all endpoints are secure from harmful attacks.

  • The Cost of Microsoft Office 365 Security and Compliance

    Sponsored by: Proofpoint, Inc.

    From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.

  • The GDPR Playbook

    Sponsored by: Proofpoint, Inc.

    Developing a plan to comply with the new rules of the EU GDPR is critical for all organizations. Leverage this guide to help you discover, plan and act on the upcoming GDPR.

  • State of Security Education: Healthcare

    Sponsored by: Wombat Security Technologies

    According to Ponemon Institute's Cost of Data Breach Study, the cost of a healthcare data breach is $380 per record. Utilize this research report to learn about security threats within the healthcare industry and how you can mitigate them.

  • Phoenix Contact's mGuard Integration with SilentDefense

    Sponsored by: SecurityMatters

    This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.

  • The Right Track to GDPR Compliance

    Sponsored by: Lynx Technology Partners

    The GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.