ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Architectures Research

  • How to Test Your Security Effectiveness

    Sponsored by: Verodin

    Download this white paper to learn about the Verodin Security Instrumentation Platform (SIP)—which uses a signal to continuously validate the layered defenses in your infrastructure to ensure they're optimally configured and working as expected.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

  • Change Assurance for Your Business-Critical Applications

    Sponsored by: Onapsis

    CIOs, CISOs and their teams often delay updating critical applications because of the potential impact on business operations. In this brief, learn about Change Assurance by Onapsis which offers a business application cyber resilience solution that allows you to detect any operational issues, protect against attacks, and enforce policies.

  • A Solution Guide to Operational Technology Cybersecurity

    Sponsored by: Fortinet, Inc.

    Operational technology (OT) and information technology (IT) have traditionally been kept separate in most cases, but now they are being integrated.The downside is that integrating the environments increases exposure to cyberattacks. In this white paper, explore the 5 best practices for protecting a converged IT-OT environment.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • A Security Approach for Protecting Converged IT and OT

    Sponsored by: Fortinet, Inc.

    Operational technology (OT) networks have traditionally been kept separate from information technology (IT) networks. But as the integration of OT and IT is accelerates, OT networks are more exposed than ever to attacks coming from IT networks. Find out how you can thwart attacks and minimize OT risk with 5 best practices in this white paper.

  • Using a Software-Defined Network Security Platform

    Sponsored by: Corsa Technology Inc

    When it comes to scaling network security, a vertical approach has usually been adopted, where a bigger device is bought every few years to keep up with the increase in traffic volume. In this white paper, learn about a new way to scale network security using a software-defined networking security platform.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

  • Scaling SSL/TLS Visibility to 10G, 100G and Beyond

    Sponsored by: Corsa Technology Inc

    In this white paper, learn how you can scale SSL/TLS visibility in an economical way to inspect all traffic passing through your network.

  • CyberConverged Data Storage

    Sponsored by: RackTop Systems

    Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.

  • CyberConverged Storage Designed for the Creative Process

    Sponsored by: RackTop Systems

    Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.

  • CyberConverged Storage: An Overview

    Sponsored by: RackTop Systems

    Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.

  • Getting a Handle on Data Exposure

    Sponsored by: RackTop Systems

    The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • CW ASEAN: Trend Watch – Security

    Sponsored by: ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • Major Oil Company Chooses Tokenization to Achieve PCI Compliance

    Sponsored by: Comforte AG

    A large oil company responsible for a vast POS network spanning 14,000 gas stations was struggling to achieve PCI compliance. After searching for a new tool, the organization decided to implement SecurDPS. Find out why they chose SecurDPS and the benefits they experienced after installation in this case study.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Managed Security for MSPs

    Sponsored by: SkOUT

    Read this white paper to learn how to provide viable cybersecurity monitoring solutions for your customers, how to successfully evolve the SOC, and how to potentially transition to an MSSP.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • Breach and Attack Simulation Made Simple

    Sponsored by: Cymulate

    Download this white paper to learn about Cymulate's SaaS-based Breach and Attack Simulation (BAS) platform. It tests both internal and external system defenses and shows exactly where you're exposed and how to fix it quickly.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.