ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • The Ultimate User Experience Guide to Driving Business Growth & Security

    Sponsored by: Evident

    In this guide book, learn why exceptional user experience ensures you'll never have to choose between growth and security, and read practical user experience tips and best practices to help you know your customer with less friction and risk.

  • Securing Cloud Transformation with a Zero Trust Approach

    Sponsored by: Zscaler

    Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. In this white paper, learn why transforming to the cloud calls for zero trust network access (ZTNA) services.

  • Not All Background Checks Are Created Equal

    Sponsored by: Evident

    Did you know that hiring someone who fraudulently uses another person's social security number in their background check can present an even bigger liability than if your company had hired someone with a criminal record? In this white paper, learn about a FCRA- compliant background check program that has identity verification capabilities.

  • Data Security for the Way People Work

    Sponsored by: Dell EMC and Microsoft

    Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.

  • The CIO's Cloud Transformation Handbook

    Sponsored by: Zscaler

    This handbook tells the story of how five leaders within global enterprises used cloud-delivered security to secure their transformation journeys and bridge the gap between business needs and IT capabilities. Read on to learn more.

  • The Fundamental Guide to Building a Better Security Operation Center (SOC)

    Sponsored by: Splunk

    The reality is that there simply isn't enough skilled security talent out there and the ones who do exist are expensive. So what can companies do to get ahead of the security talent gap? Download your copy of "The Fundamental Guide to Building a Better Security Operation Center (SOC)" to learn more.

  • Top 10 North American Bank Eliminates Credential Stuffing

    Sponsored by: Shape Security

    A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.

  • What Hackers Know That You Don't: Identity Assurance in the Digital Age

    Sponsored by: Evident

    Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. Attackers can combine info from now-infamous breaches with publicly available info to further compromise a user's identity to various ends. Download this white paper for practical tips to protect against hacks today.

  • Top 3 Telecom Provider Secures Mobile Accounts

    Sponsored by: Shape Security

    A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.

  • Live Threat Briefing New Attack Trends in Retail

    Sponsored by: Shape Security

    Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

  • The SIEM Buyer's Guide for 2020

    Sponsored by: Splunk

    The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.

  • How to Up Level your Defenses with Security Analytics

    Sponsored by: Splunk

    If you don't have actionable insights to detect and respond to emerging and current threats, you're not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • Q2, 2019 Cyberthreats & Trends Report

    Sponsored by: Neustar

    While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Proofpoint

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Build a Security-Focused Data Center

    Sponsored by: Red Hat

    Security continues to be a top concern for all organizations. With a security-focused design, Red Hat Enterprise Linux can help you better protect your datacenter and your business. Download this solution brief to learn more.

  • How OneTrust Helps with the California Consumer Privacy Act (CCPA)

    Sponsored by: OneTrust

    The California Consumer Privacy Act (CCPA) will take effect on January 1, 2020. Organizations that conduct business in California now need a scalable way to discover what data they hold, how it is used, and what third parties have access to it. Learn how with OneTrust, your organization can take a holistic approach to CCPA compliance.

  • Top 10 Security Changes in Red Hat Enterprise Linux 8

    Sponsored by: Red Hat

    In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.

  • Infographic: 5 ways to achieve a risk-based security strategy

    Sponsored by: ComputerWeekly.com

    In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.

  • Mitigating OT Cyber Risk with the Fortinet Security Fabric

    Sponsored by: Fortinet, Inc.

    Organizations are leveraging digital technologies such as IoT, cloud, artificial intelligence (AI), and others to optimize operations, improve safety and reliability, and gain a competitive edge.

  • Cyber Deception Systems

    Sponsored by: Acalvio

    This Market Segment Report covers Cyber Deception Systems (CDS) and the market position of 18 vendors delivering products and services for CDS. Read on to learn about CDS capabilities (e.g. lures, breadcrumbs, honeypots, decoys, and traps) as well as the different vendors in the market.

  • How IT Administrators Are Tackling Active Directory and Security

    Sponsored by: Zoho

    ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.

  • 15 Ways to Weed the Regulatory Violations Out of Your Spend

    Sponsored by: AppZen

    You may have a best-in-class system for approving expenses and accounts payable, but if you're not doing a thorough audit of all spend prior to disbursement, you likely have regulatory violations lurking in there. Download this e-book for a checklist on 15 ways to identify spend-related regulatory violations.

  • Total Access Control Addresses Risk-based Security for Any Device and Application

    Sponsored by: PortSys

    While all companies are concerned about security, those in the financial services industry are especially so. In this case study, learn how a financial services firm was provided risk-based security with PortSys Total Access Control.

  • Total Access Control Provides Zero Trust Application Access for Financial Services Firm

    Sponsored by: PortSys

    A financial services firm needed to find a new access control solution that ensured only authorized users accessed their system. In this case study, learn how the firm was able to use PortSys Total Access Control (TAC) to do so.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.