ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • New Topics on the New Security+ SY0-501 Exam

    Sponsored by: Global Knowledge

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

  • Under the Hoodie 2019

    Sponsored by: Rapid7

    Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.

  • How to be a SOAR Winner

    Sponsored by: IBM

    As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • Your Cybersecurity Tech Stack Creating More Gaps

    Sponsored by: Optiv

    It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.

  • Easy Ways to Dominate the Securities-as-a-Service Game

    Sponsored by: RapidFire

    Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.

  • The Financial Adviser's Guide to Compliant IM and Collaboration

    Sponsored by: Smarsh

    The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.

  • The Financial Adviser's Guide to Social Media Strategy and Policy

    Sponsored by: Smarsh

    The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.

  • Blueprint for PCI Compliance with Network Detective

    Sponsored by: RapidFire

    The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Sponsored by: Barracuda

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Infographic: 5 ways to achieve a risk-based security strategy

    Sponsored by: ComputerWeekly.com

    In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

  • CyberConverged Data Storage

    Sponsored by: RackTop Systems

    Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.

  • CyberConverged Storage Designed for the Creative Process

    Sponsored by: RackTop Systems

    Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.

  • CyberConverged Storage: An Overview

    Sponsored by: RackTop Systems

    Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.

  • Getting a Handle on Data Exposure

    Sponsored by: RackTop Systems

    The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • 10 Opportunities for MSPs and MSSPs to Deliver MDR Services

    Sponsored by: AT&T Cybersecurity

    For service providers, the Managed Detection and Response (MDR) trend creates an opportunity to stay competitive and add value that helps clients defend and respond to cyber threats. Read about 10 opportunities to embrace and deliver competitive MDR services.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.