ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • CW ASEAN: Trend Watch – Security

    Sponsored by: ComputerWeekly.com

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Cloud Visibility Report

    Sponsored by: FairWarning

    As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • Industry Cyber-Exposure Report

    Sponsored by: Rapid7

    Rapid7's recently conducted a cybersecurity test to measure exposure and resiliency in the United Kingdom. They measured the Internet-facing security profiles of the FTSE 2501 plus a handful of non-FTSE 250 members. Explore the results in this report.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • Breach and Attack Simulation Made Simple

    Sponsored by: Cymulate

    Download this white paper to learn about Cymulate's SaaS-based Breach and Attack Simulation (BAS) platform. It tests both internal and external system defenses and shows exactly where you're exposed and how to fix it quickly.

  • Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Sponsored by: FairWarning

    Cloud solutions can reduce costs, but storing information in the cloud can present security risks. This doesn't mean organizations shouldn't use the cloud; however they should amp up their security to protect their data. This white paper will help you decide whether to build or buy cloud security software by determining your top priorities.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

  • How to choose the right micro-segmentation provider

    Sponsored by: Guardicore

    As micro-segmentation grows in popularity, there are a number of options to choose from for security operations, from the vendors themselves to the tools and processes they offer. Download this white paper to explore the essential elements to consider before choosing a micro-segmentation provider today.

  • Real-World Customer with Secure Application Infrastructure

    Sponsored by: VMware

    In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.

  • CloudCheckr is the Engine Driving Cloud Governance at Siemens

    Sponsored by: Cloudcheckr

    Railigent monitors the physical infrastructure required to keep rail transportation reliable and safe, but turned to CloudCheckr to ensure the cloud infrastructure it relies on is just as secure. In this case study, learn how CloudCheckr has streamlined Railigent's security protocols to ensure developers can easily identify security issues.

  • Welcome to the Future of Cyber Security: Top 5 Cloud Security Challenges

    Sponsored by: Checkpoint Software Technologies

    Businesses are rapidly migrating workloads and data to public cloud environments to improve efficiencies, drive innovation and increase responsiveness to market conditions. While the cloud provides numerous benefits there are also some rather unique security challenges. In this white paper, explore the top 5 security challenges in the public cloud.

  • Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope

    Sponsored by: ALTR

    Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.

  • Modernizing Your Infrastructure? Here's Why You Should Take a Security-First Approach

    Sponsored by: Nutanix

    Just because your job title doesn't include the word "security" doesn't mean you shouldn't be worrying about cyber-attacks. In today's world, security is an all hands on deck priority – especially at the infrastructure level. Inside, find out why IT infrastructure choices can make or break your team's ability to protect against cyber threats.

  • Turbocharge ITOps Productivity for Security and Efficiency

    Sponsored by: BMC

    It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.

  • Using Indicators to Deal with Security Attacks

    Sponsored by: ManageEngine

    Download this white paper to understand the unique capabilities of these indicators, the differences between them, and the steps to configure a SIEM platform to detect indicators of compromise (IoCs) and indicators of attack (IoAs).

  • The Importance of Choosing the Right CASB Solution

    Sponsored by: Forcepoint

    In this research report, explore key takeaways from an in-depth survey conducted by Osterman Research. This survey asked 174 decision-makers at companies that already have, or are in the process of deploying cloud access security broker software about their experiences.

  • Armor File Integrity Monitoring (FIM)

    Sponsored by: Armor

    When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.

  • Leading International Fintech Businesses in Consumer Credit

    Sponsored by: Armor

    As the Quint Group continued its global expansion, it was critical that the platforms supporting the business were secure and scalable. As a result, they were looking for a new platform that had security built in. In this case study, learn why the Quint Group decided to move their infrastructure to Armor.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.