ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Industry Research

  • The CIO’s Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

  • Survey Report: Evolution of the CASB

    Sponsored by: Proofpoint

    In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.

  • Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis

    Sponsored by: Comcast Business

    Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.

  • Measuring the ROI of an Incident Response Platform

    Sponsored by: Palo Alto Networks

    A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.

  • A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense

    Sponsored by: IronNet

    Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.

  • Getting Started with CASB

    Sponsored by: Proofpoint

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.

  • Apex One Datasheet

    Sponsored by: Trend Micro

    The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.

  • Securing the Pandemic-Disrupted Workplace

    Sponsored by: Trend Micro

    COVID-19 has granted threat actors the permission to get their hands as dirty as possible. A spike in remote work has given them a larger attack surface than ever, and although the number of new cases is decreasing, these attacks show no signs of going away. To get the numbers behind the danger, jump into this in-depth report.

  • 5 Critical Requirements for Internal Firewalling in the Data Center

    Sponsored by: VMware

    Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.

  • 92% Of The World’s Top Websites Expose Customer Data To Attackers

    Sponsored by: Tala Security

    It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.

  • Software-Defined Networks are Creating New Challenges for Enterprise Security

    Sponsored by: Palo Alto Networks

    A panel of 300 North American respondents was asked about how they use SD-WAN and what drives their security concerns in those deployments. What were the main drivers for adopting SD-WAN? What benefits have been recognized? How do they plan to consolidate functions with respect to SD-WAN? Read this report to get these answers and more.

  • Measuring the ROI of Security Orchestration and Response Platforms

    Sponsored by: Splunk

    Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.

  • Tension between IT and Security Professionals Reinforces Silos and Security Strain

    Sponsored by: VMware

    IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.

  • Strong Customer Authentication (SCA)

    Sponsored by: Vonage

    In recent years, Europe has ramped up on regulations concerning payment services and payment authentication. Legislation requires payment service providers (PSPs) to deliver strong customer authentication (SCA). Jump into this white paper to learn how to remain compliant without compromise.

  • Penetration Testing Vendor Selection Checklist

    Sponsored by: Synack

    In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.

  • Customer Case Bergman Clinics

    Sponsored by: Zivver

    In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.

  • Security Orchestration For Dummies

    Sponsored by: Palo Alto Networks

    Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.

  • Next-Generation Firewall Buyer’s Guide

    Sponsored by: Palo Alto Networks

    Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.

  • Securing Remote Privileged Access Using Cloud Workspaces and Secure Perimeters

    Sponsored by: Tehama

    Leveraging a global workforce is riddled with security risks, risks that virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) do not provide sufficient protection against. The next step? View this white paper to learn the limitations of VDI and DaaS and to learn the principles of secure perimeters for cloud workspaces.

  • Onboarding Third-Party IT Service Providers Doesn’t Have to be Complicated, Costly, or Risky

    Sponsored by: Tehama

    According to Gartner, the biggest challenge Chief Procurement Officers (CPOs) face is the time it takes to securely onboard outside organizations and vendors into their information systems and business apps. Read this white paper to learn the risks and challenges when hiring third-party IT service providers or providing remote network access.

  • Assessing the Economic Impact of Cybereason

    Sponsored by: Cybereason

    As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.

  • Securing the Workplace of the Future

    Sponsored by: Tehama

    By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.

  • 6 Reasons You Should Switch to Cloud-Based Patch Management

    Sponsored by: Automox

    Traditional, on-premise patch management platforms were not designed to handle the evolved threats that exist today. With cloud-based agility, every piece of an organization receives critical security updates in a timely manner. Browse this guide to learn more on why cloud-based patch management makes for greater productivity and security.

  • Seton Hall University Uncovers Ongoing Threats and Lowers Cost with Cybereason

    Sponsored by: Cybereason

    A prominent university on the east coast was not confident in its network’s visibility and protection. They searched for a powerful solution that could provide both the visibility they needed and strong detection through the use of a single agent. Read this case study to learn the details of Seton Hall’s choice of Cybereason for security.

  • TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT

    Sponsored by: CyberArk Software, Inc

    Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.