ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • NIST Maturity Report

    Sponsored by: Optiv

    The National Institute of Standards and Technology (NIST) cybersecurity framework exists to help organizations better understand, manage, and decrease cybersecurity risk. How aligned is your security program to this industry-accepted framework? Determine your NIST alignment by taking this quick quiz today.

  • Easy Ways to Dominate the Securities-as-a-Service Game

    Sponsored by: RapidFire

    Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.

  • Blueprint for PCI Compliance with Network Detective

    Sponsored by: RapidFire

    The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.

  • Top 5 Reasons To Choose AppViewX’s Certificate Lifecycle Automation Solution

    Sponsored by: AppViewX

    Download this infographic to explore why certificate management is so crucial for digital businesses and explore key attributes of AppView’s Certificate Lifecycle Automation Solution.

  • Efficient Threat Remediation with Check Point and ServiceNow

    Sponsored by: ServiceNow

    Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.

  • Channel Security Experts Deep Dive: The Anatomy of an MSP Breach

    Sponsored by: Datto, Inc.

    In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.

  • Securing Office 365 Against Data Loss and Advanced Threats

    Sponsored by: Datto, Inc.

    Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.

  • Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day

    Sponsored by: Datto, Inc.

    Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.

  • RMM & Patch Management: The First Line of Defense Against Cyber Threats

    Sponsored by: Datto, Inc.

    Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Top 6 Security Tips For Midsized Businesses

    Sponsored by: Aruba Networks

    If you’re a midsize business, reducing the risk of security breaches on your network is key. Explore 6 tips to help ensure your company and your network are safe in this white paper.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Sponsored by: Barracuda

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Security and Compliance with Microsoft Teams

    Sponsored by: Insight

    In this climate of concern over security, how can businesses be sure the content they share on Microsoft Teams will remain safe? Find out in this blog post, which explores Teams' built-in features and how they help support your security and compliance needs.

  • MicroScope – October 2019: What's next for the channel?

    Sponsored by: MicroScope

    The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

  • Manage your End-of-Life IT Assets Securely and Responsibly

    Sponsored by: Iron Mountain

    As organizations migrate to new technologies to innovate, drive efficiencies and enable new ways of working, they can't simply throw their old IT and office equipment in the bin. Security must stay top of mind. Download this brief to learn about Iron Mountain's Secure IT Asset Disposition Service.

  • How Tier One Bank can Innovate Alongside Financial Aggregators

    Sponsored by: Shape Security

    Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.

  • The Most Common Types of Invoice Fraud and How to Prevent Them

    Sponsored by: AppZen

    How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.