ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Architectures Research

  • Three Guiding Principles to Improve Data Security and Compliance

    Sponsored by: IBM

    In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.

  • Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers

    Sponsored by: Trend Micro

    In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Flexibly Align Data Protection to different SLAs

    Sponsored by: Fujitsu

    This exclusive white paper discusses a data backup tool that can flexibly align data protection to different service level agreements (SLAs) to enhance your data protection environment and ensure speedy recovery when disaster inevitably strikes.

  • A Practical Disaster Recovery Protection Tool

    Sponsored by: Fujitsu

    This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.

  • Best Practices For Your Threat Management Program

    Sponsored by: IBM

    In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!

  • MDM for a Secure Mobile Workforce

    Sponsored by: BlackBerry

    This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.

  • Enterprise BYOD Management: An IT Guide

    Sponsored by: BlackBerry

    This expert guide from SearchConsumerization.com dives head-first into the pros and cons of enterprise BYOD, examining why some people love it, how to overcome common security pitfalls, and how to effectively manage a BYOD program that empowers your workforce while keeping mobile data safe.

  • Mobile Security: Containerizing Enterprise Data

    Sponsored by: Code42

    Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.

  • The Use Case for Integrated Vulnerability Management CORE Security

    Sponsored by: Core Security Technologies

    This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.

  • Secure the Extended Enterprise

    Sponsored by: TechTarget CIO

    CIOs and analysts discuss strategies for extending the reach of enterprise security management in this SearchCIO handbook.

  • Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection

    Sponsored by: OpenText Security Solutions

    This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.

  • Okta Active Directory Integration - An Architecture Overview

    Sponsored by: Okta

    This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.

  • Determining the Most Effective Endpont Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • Computer Weekly special report: Mobile device management and the importance of absolute compliance

    Sponsored by: BlackBerry

    Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.

  • Video: Amazon Web Services API Security Overview

    Sponsored by: Intel

    Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.

  • Storage Magazine: How to improve your virtual server storage setups

    Sponsored by: IBM.

    In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.

  • How Citrix ShareFile Enables Secure Data Sharing in the Enterprise

    Sponsored by: Citrix Systems, Inc.

    This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Getting a better grip on mobile devices

    Sponsored by: IBM

    This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.

  • E-Guide: Evaluating network security virtualization products

    Sponsored by: Sophos

    This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: TechTarget Security

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  • Use BYOD Policies to Integrate Personal Devices Securely

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com highlights the importance of implementing effective BYOD policies to ensure the security of your health care data. Moreover, learn how to embrace BYOD without compromising compliance.

  • Cloud security concerns you must address

    Sponsored by: HP & Intel®

    This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.