ComputerWeekly.com Research Library

Powered by Bitpipe.com

Securities Industry Research

  • Solve the Security Puzzle with End-to-End Security Solutions

    Sponsored by: Dell

    Download this "Mid-market end-to-end security e-guide" to learn how Dell Technologies can enable your digital transformation with comprehensive security solutions covering: Trusted devices, trusted infrastructure, trusted data and end-to-end services

  • Solve the Security Puzzle with End-to-End Security Solutions

    Sponsored by: Dell Technologies and Intel

    Download this “Mid-market end-to-end security e-guide” to learn how Dell Technologies can enable your digital transformation with comprehensive security solutions covering: Trusted devices, trusted infrastructure, trusted data and end-to-end services

  • CISSP Has Changed (Again): What it Means for Your Certification Prep

    Sponsored by: Global Knowledge

    In April 2018, the CISSP (Certified Information Systems Security Professional) exam was updated with changes to the topics covered and format of the test. In this study guide, overview the revisions to the exam and uncover some tips and tricks to passing the exam. Read on to get started with your CISSP preparation.

  • Top 6 Security Tips For Midsized Businesses

    Sponsored by: Aruba Networks

    If you’re a midsize business, reducing the risk of security breaches on your network is key. Explore 6 tips to help ensure your company and your network are safe in this white paper.

  • How the Unity EdgeConnect SD-WAN Edge Platform Supports PCI DSS Compliance

    Sponsored by: Silver Peak

    According to the latest Nilson Report, worldwide payment card fraud losses reached $24.3 B in 2018 and are expected to exceed $34 B by 2022. Read this white paper to learn how Silver Peak's SD-WAN can help keep you safe and comply with most PCI DSS requirements.

  • How to Automate Mobile AppSec without the Staff

    Sponsored by: Data Theorem

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.

  • Automating Software Security Checks for Open Source Software and SDKs

    Sponsored by: Data Theorem

    The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.

  • How 1 Company Combats App Issues Before Public Release

    Sponsored by: Data Theorem

    Learn how Data Theorem's App Secure is helping Evernote identify and fix variety of vulnerability issues in their apps before releasing them to the public app stores.

  • Securing Your Business Amid Cloud Migration

    Sponsored by: BT

    Learn about a new way to tackle cybercriminals in this resource, and find out how you can stay protected when completing your move to the cloud.

  • The State of Web Application Security

    Sponsored by: Radware

    Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.

  • Cybersecurity for the Modern Era: Choosing People-Centered Solutions

    Sponsored by: Proofpoint

    Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.

  • Advanced Email Security

    Sponsored by: Proofpoint

    Uncover how to prevent, detect, and respond to today's most advanced attacks with Proofpoint Advanced Email Security platform.

  • To SIEM or not to SIEM

    Sponsored by: Arctic Wolf Networks, Inc.

    Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.

  • Build or Buy? Security Operations Center Strategies for Midmarket Companies

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.

  • SANS Review: SOC-as-a-Service

    Sponsored by: Arctic Wolf Networks, Inc.

    In this brief resource, SANS reviews Arctic Wolf's SOC-as-a-Service offering so you can see how it stacks up against the competition.

  • 5 Ways to Manage Mobility and IOT Risks

    Sponsored by: Aruba Networks

    In this white paper, learn the five steps you need to take to mitigate the risk of mobile and IoT-enabled data breaches.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • How Ransomware Attacks have Changed

    Sponsored by: CyberArk Software, Inc

    Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.

  • Logrythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • Your Guide to Combatting Ransomware's Domination of 2017

    Sponsored by: CyberArk Software, Inc

    Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.

  • Preventing Ransomware: Healthcare CIO Discusses Top Technologies

    Sponsored by: Cisco Umbrella

    In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco Umbrella

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.