ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement

    Sponsored by: Ziften

    38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.

  • 5 Steps to Selecting an Enterprise Anti-Virus Replacement

    Sponsored by: Ziften

    Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • Understanding What's at Stake with Privileged Accounts

    Sponsored by: One Identity

    In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • Understanding Your Attack Surface in AWS (and Other Cloud Providers)

    Sponsored by: Radware

    Do you know how your attack surface changes when moving workloads to the public cloud? In this video discussion, learn how you can adapt your security strategy when moving to the public cloud.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Come Hack With Me: The Anatomy of a Data Breach

    Sponsored by: Radware

    Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.

  • How to Capitalize on the Multi-billion Dollar Market for Managed Security Services

    Sponsored by: IBM

    Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.

  • Aeris and ROAMWORKS: Protecting Cargo from Security Challenges

    Sponsored by: Aeris

    To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.

  • Solutions for Privileged Account Resilience

    Sponsored by: One Identity

    Tune into this informative podcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.

  • Securing Cellular Enterprise IoT Solutions

    Sponsored by: Aeris

    Aeris' solutions for cellular IoT device identity, data access security, and remote update management address today's security risks and can help IoT device manufacturers and solution providers comply with existing and near-term regulations. Download this white paper to learn more today.

  • Accelerating Digital Transformation with Direct-to-Cloud Connectivity and Security

    Sponsored by: Forcepoint

    Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Tune into this webinar to learn more.

  • Who Watches the Watchers?

    Sponsored by: Forcepoint

    Tune into this webcast as, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.

  • Understanding the Limitations of Microsoft Office 365 Security

    Sponsored by: Forcepoint

    Tune into this webcast where CEO and founder of Osterman Research, Mike Osterman, discusses the key findings of an Office 365 study and organizations' priorities around email security.

  • Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor

    Sponsored by: ALTR

    Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.

  • Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope

    Sponsored by: ALTR

    Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • Solution Brief: A Unified-Client Platform for Enterprise-Grade Endpoint Security

    Sponsored by: SonicWall

    With the growth of ransomware and the persistent use of credential theft, endpoints are the battleground of today's threat landscape. That's why many turn to SonicWall Capture Client for advanced behavior-based malware protection, cloud sandbox file testing, and web threat protection. Download this brief to learn more about the benefits today.

  • The State of Email Security Report 2019

    Sponsored by: Mimecast

    Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.

  • Restricting Device Communications to Select Destinations

    Sponsored by: Aeris

    Gaining security for your IoT devices is a critical step for any deployment, large or small. Keeping your data secure can be business critical. The key to all of this is the ability to restrict device communications only to select web destinations of your choosing. Read on to learn how Aeris ConnectionLock makes this possible.

  • Solution Brief: Real-Time Deep Memory Inspection

    Sponsored by: SonicWall

    Learn about SonicWall Real-Time Deep Memory Inspection technology and how it can catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate.

  • How to Address the Top Five Human Threats to Your Data

    Sponsored by: ALTR

    Data security threats seem to be everywhere and growing. Even the most hardened, off-the-grid security experts acknowledge that it is impossible to be 100% secure. Addressing top threats to your data is the first step in building a layered, data-centric approach to data security and privacy. Read on to learn how you can get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.