ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs

    Sponsored by: Dell SecureWorks

    Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.

  • HPE Security Analysis and Roadmap Service

    Sponsored by: TechData

    In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.

  • Choosing the Best Mobility Management Solution

    Sponsored by: BlackBerry

    Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.

  • Compliance Made Easy

    Sponsored by: Armor

    The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.

  • The Ultimate Guide to The NIST Cybersecurity Framework

    Sponsored by: CyberSaint

    In this 10-minute read, understand the purpose, origin, and value of the NIST Cybersecurity Framework, important methods to simplify adoption, and actionable recommendations from compliance and risk expert – read on to get started.

  • How to Respond Rapidly to Emerging Cyberthreats

    Sponsored by: ThreatQuotient

    Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.

  • Addressing Enterprise Security Challenges

    Sponsored by: Rackspace

    In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.

  • End-to-end risk, compliance & audit management

    Sponsored by: Reciprocity Labs

    For today's organizations, managing risk, compliance and audit processes has become a daunting routine. Because of that, organizations are turning to third-party vendors to help with speeding up audit cycles and offering enhanced visibility and risk management. Download this solution brief for an overview of ZenGRC's management platform.

  • Netskope's search for an efficient, scalable and compliance-ready platform

    Sponsored by: Reciprocity Labs

    In this case study, follow Netskope, an international security cloud company, as they partner with ZenGRC in order to implement a platform that saw improvements to compliance audit times, productivity, scalability and decision-making. Read on to unlock the full story.

  • Remediant Framework Mapping and Assessment

    Sponsored by: Remediant

    The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.

  • Achieving ISO 27001 and 27002 Certification with ZenGRC

    Sponsored by: Reciprocity Labs

    The Challenge: Meeting evolving InfoSec mandates, when starting nearly from scratch.

  • Dtex Intercept Next-Gen Insider Threat Platform

    Sponsored by: Dtex

    Insider threats, both malicious and accidental, are a growing concern amongst today’s organizations. The following solution brief highlights the key features and capabilities of Dtex Intercept, an insider threat platform designed to equip users with the ability to proactively identify, categorize and isolate potentially harmful insider behavior.

  • Privileged Account Management for Dummies

    Sponsored by: IBM

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Sponsored by: ComputerWeekly.com

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    Sponsored by: SailPoint Technologies

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • CISO’s Guide to Reducing Risk with Responsible Disclosure

    Sponsored by: HackerOne

    Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.

  • The Business Case for Cysiv SOC-as-a-Service

    Sponsored by: Cysiv

    Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.

  • Security Leaders Handbook

    Sponsored by: HackerOne

    Stepping into a new security leadership position can feel overwhelming: addressing the immediate security needs as well as setting the right foundation for long-term initiatives isn’t an easy task. To help you navigate the first 90 days of your role, and beyond, download this Security Leaders Handbook, which provides guidance and expertise.

  • Microsoft Data Protection: A Growing Success Story

    Sponsored by: InteliSecure

    In 2017, InteliSecure conducted an evaluation of Microsoft’s data protection capabilities – the results were less than ideal. Since then, Microsoft has made great improvements to the built-in data protection capabilities native to their licensing bundles. Download this e-guide for a closer look at Microsoft’s data protection advances.

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.