ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response

    Sponsored by: IBM

    This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.

  • A Manifesto for Cyber Resilience

    Sponsored by: Symantec Corporation

    In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.

  • Security Operations Center (SOC) Essentials for the SME

    Sponsored by: AT&T Cybersecurity

    Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.

  • Microsoft Office 365: Strengthening Security, Compliance, and Control

    Sponsored by: Mimecast

    This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.

  • Coming at You: How to Deal with the Latest DDoS Attacks

    Sponsored by: TechTarget Security

    Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.

  • Taking Managed Security Services To The Next Level

    Sponsored by: OpenText Security Solutions

    This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.

  • International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT

    Sponsored by: Cisco

    This resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.

  • Modern network security for modern threats

    Sponsored by: Palo Alto Networks

    This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.

  • Managing Security Risks and Vulnerabilities

    Sponsored by: IBM

    Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: TechTarget Security

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls

    Sponsored by: Sophos

    Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.

  • Mobile Security Insider's Edition

    Sponsored by: TechTarget Security

    This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.

  • Planning a Career Path in Cybersecurity

    Sponsored by: Global Knowledge

    The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.

  • Internal API Management

    Sponsored by: Intel Corporation

    This exclusive paper examines a flexible platform approach to managing the custom business models and data center deployment needs of today's APIs.

  • Enhancing End-to-End Cloud Security: Part 3

    Sponsored by: Intel Security

    This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data

    Sponsored by: IBM

    IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.

  • Case Study - System One

    Sponsored by: OpenText Security Solutions

    This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • It’s Time Businesses Wake up to Mobile Security Reality

    Sponsored by: Threat Track Security

    This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.

  • Closing the security gap: 2012 IOUG enterprise data security survey

    Sponsored by: Oracle Corporation UK Ltd

    This exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Sponsored by: TechTarget ComputerWeekly.com

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.