ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Threat Intelligence Executive Report

    Sponsored by: Dell SecureWorks

    The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.

  • Empower Security Analysts Through Guided EDR Investigation

    Sponsored by: McAfee

    Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.

  • 10 Ways to Take MITRE ATT&CK From Plan to Action

    Sponsored by: Splunk

    In this e-book, explore how the MITRE ATT&CK framework helps different parts of the organization.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • How to Design IoT Infrastructure in 7 Parts

    Sponsored by: ARM

    As with any new technology, getting started with IoT presents many challenges, starting with setting up IoT infrastructure. Organizations can prepare their IoT deployments for success by understanding each IoT infrastructure component and how they all work together. In this e-guide, explore the 7 key components of IoT infrastructure.

  • Empowering Business Innovation: Ricoh USA, Inc. Partners for Success

    Sponsored by: Dell SecureWorks

    In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • Access management: An evaluation and comparison of vendors

    Sponsored by: IBM

    SaaS-delivered access management has become the norm – enabling organizations to provision or prohibit access throughout their dynamic networks. This Gartner Magic Quadrant Report provides an unbiased evaluation of key vendors and offerings within the access management landscape. Download this report to see who were crowned as leaders.

  • 2020 SIEM Vendor Comparison Report

    Sponsored by: IBM

    Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."

  • Effectively Addressing Advanced Threats Survey

    Sponsored by: IBM

    Keeping up with these threats can be daunting—until we consider what it takes to defend against them. Not all threats are created equal—however, not all defenses are created equal either. This survey from SANS Institute, in partnership with IBM, uncovers how large, mature organizations deal with advanced threats.

  • Privileged Account Management for Dummies

    Sponsored by: IBM

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

  • 2019 Report for Identity Governance & Administration

    Sponsored by: IBM

    For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.

  • Complexity in Cybersecurity Report

    Sponsored by: IBM

    Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.

  • How to Secure Operational Technology

    Sponsored by: Fortinet, Inc.

    The consequences of a successful intrusion into operational technology (OT) are serious. In businesses that rely on operational and industrial production systems, the chief information security officer (CISO) must ensure that security teams have the right architectural defenses in place. Read this checklist for 7 considerations for securing OT.

  • Identity & Access Management from IBM

    Sponsored by: IBM

    Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.

  • Building Robust Endpoint Defenses with Limited Resources

    Sponsored by: Kaspersky Lab

    91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.

  • A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access

    Sponsored by: IBM

    Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.

  • E-Book: 5 Questions to Ask Before You Upgrade to a Modern SIEM Solution

    Sponsored by: IBM

    Traditional cybersecurity approaches are no longer viable for organizations as they balance the modern needs of compliance requirements and technological innovation. The need for modern security has given rise to SIEM. This e-book poses 5 critical questions to ask yourself before upgrading to a SIEM solution.

  • Pervasive Data Defense Platforms Address Cloud Security Challenges

    Sponsored by: McAfee

    The complexity of managing sensitive data across hybrid cloud and multi-cloud environments is ushering in a new era of pervasive data defense and response platforms. Download this IDC report for an overview of the security benefits these platforms provide.

  • Why & How to Merge Your SD-WAN and Security Strategies

    Sponsored by: SearchNetworking.com

    SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.

  • Why Traditional EDR Is Not Working—and What to Do About It

    Sponsored by: McAfee

    The EDR market has exploded in recent years. But just because the product carries an EDR description, doesn’t mean those products have been proven particularly effective. In this SANS white paper, discover pitfalls in current EDR deployments, a checklist for evaluating EDR products, and much more.

  • KuppingerCole Executive View

    Sponsored by: IBM

    IBM Cloud Pak for Security is an open platform that supports the integration of existing security tools for generating insights into cyber events across hybrid, multi-cloud environments. Download the KuppingerCole Executive View to learn more.

  • The Business Value of a Security Monitoring and Analytics Platform

    Sponsored by: IBM

    As security monitoring and analytics initiatives mature, a platform approach reduces the time to identify, investigate, and respond to security-related incidents — and drives a significant reduction in risk. Learn more about the success of a secure, compliant, and well-managed infrastructure.

  • EDR: The Case for Automation and Simplification

    Sponsored by: Kaspersky Lab

    Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.

  • An overview of IBM’s identity & access management services

    Sponsored by: IBM

    This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.