ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • CW ASEAN November 2016

    Sponsored by: SearchSecurity.com

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: McAfee, Inc.

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Discover SIEM Capabilities For Real-Time Analysis

    Sponsored by: LogRhythm, Inc.

    In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.

  • Top Benefits of Integrated Endpoint Protection

    Sponsored by: Trend Micro, Inc.

    When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software and find out for yourself.

  • Enhance Your Endpoint Security Protection

    Sponsored by: Trend Micro, Inc.

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • New Data Classifications Vital to Information Governance and Security

    Sponsored by: STEALTHbits

    In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Is Managed Security Monitoring Right for Your Organization?

    Sponsored by: IBM

    The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.

  • User Provisioning Best Practices: Access Recertification

    Sponsored by: STEALTHbits

    User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.

  • Straddling the Security Divide Between On-Premises and Cloud

    Sponsored by: SearchSecurity.com

    Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • IoT Security Testing: Cover All Your Bases

    Sponsored by: Synopsys

    Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • The Connection between IoT and DDoS Attacks

    Sponsored by: Arbor Networks

    In this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.

  • How to Use an Incident Response Policy to Better Collaborate

    Sponsored by: Delta Risk

    In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • How to Mitigate Shadow Cloud Services Security Risks

    Sponsored by: IBM

    Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.