ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • How to Remove Complexity as a Threat to Security

    Sponsored by: Cyxtera

    Watch this webinar to learn about reducing complexity when securing hybrid workloads.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Break the Link Between Users and Cyber Threats

    Sponsored by: Avast Business

    Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.

  • Rethinking the Cyber Security of Consumer Internet of Things

    Sponsored by: ComputerWeekly.com

    The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.

  • Expert Guide to DNS, SME Security, and Zero-Day Attacks

    Sponsored by: Avast Software

    Get up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends.

  • How to Automate Mobile AppSec without the Staff

    Sponsored by: Data Theorem

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.

  • Automating Software Security Checks for Open Source Software and SDKs

    Sponsored by: Data Theorem

    The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.

  • Cybersecurity Driver's Ed. Operating Behaviors Bound for a Breach

    Sponsored by: Avast Software

    In order to safeguard your business from hackers or unauthorized users, you must take proper security precautions to stay secure. Download this infographic for the do's and don'ts of cybersecurity best practices today.

  • How Much Does it Cost to Build a 24x7 SOC?

    Sponsored by: Expel

    To say SOCs are costly is an understatement—they can range anywhere from $10,000 to more than $10 million. Download this white paper to review 4 SOC options and costs associated with them, as well as what they can do for your organization.

  • Securing Your Business Amid Cloud Migration

    Sponsored by: British Telecommunications PLC

    Learn about a new way to tackle cybercriminals in this resource, and find out how you can stay protected when completing your move to the cloud.

  • SIEM Buyer's Guide

    Sponsored by: HelpSystems

    It's no longer possible for organizations to use manual analysis to detect intrusions or protect against IT risks. That's why some organizations are using SIEM software to help them handle the job. In this SIEM Buyer's Guide, find key features to look for in SIEM software, cost considerations, requirements checklist, and much more.

  • NPMD for Network Security Forensics

    Sponsored by: Viavi

    Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.

  • UniCredit Delivers Omni-Channel Excellence With Real-Time Operational Insights

    Sponsored by: Splunk Services UK Ltd

    UniCredit needed a way to collect, store and analyze machine data from multiple sites, systems and applications in order to provide optimal service for its banking customers. Download this case study to see how Splunk Enterprise allowed UBIS to do so.

  • IBM i Encryption: How to Protect Your Database

    Sponsored by: HelpSystems

    Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.

  • How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model

    Sponsored by: MASERGY

    In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.

  • Resolving the Agile vs. Secure Application Networking Tradeoff

    Sponsored by: NetFoundry

    Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.

  • How to Separate True Threats from False Positives with Machine Learning

    Sponsored by: ThreatX

    Today, AppSec teams have too much to analyze and not enough people to do so. In this white paper, take a look at a blended approach to security alerts and threats and see how your organization can separate true threats from false positives.

  • Can Application Security Actually Improve Your Bottom Line?

    Sponsored by: F5 Networks

    Download this white paper to learn about security tools that operate in any cloud environment, and help you know what makes your apps vulnerable and how they can be attacked, so you can mitigate threats and lower your risk.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • What's Threatening IT Security?

    Sponsored by: Aruba Networks

    What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.

  • Automating Detection and Response: A SANS Review of Swimlane

    Sponsored by: Swimlane

    In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.

  • 2019 Forcepoint Cybersecurity Predictions Report

    Sponsored by: Forcepoint

    Explore the 2019 Forcepoint Cybersecurity Predictions Report to examine a collection of industry trends and threats impacting organizations in the new year.

  • The Forrester Wave: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

    Sponsored by: Cyxtera

    The concept and framework of Zero Trust is booming in the security industry today. Read on to learn how 14 different Zero Trust eXtended ecosystem providers stack up.

  • 6 Ways to Make Your Security Stack Work Harder

    Sponsored by: Cisco Umbrella

    Discover how to amplify your existing investments to extend your security off-network, anywhere users go.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.