ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • How to Approach Storage Disaster Recovery

    Sponsored by: Rubrik

    In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.

  • Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay

    Sponsored by: Trend Micro, Inc.

    In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.

  • Testing the Cloud: Ensuring Enterprise Data is Secure

    Sponsored by: Trend Micro, Inc.

    In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.

  • Managing Information Security Amid New Threats: A Guide for CIOs

    Sponsored by: Cisco Umbrella

    In this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.

  • Build a Cohesive, Effective Security Strategy

    Sponsored by: Splunk

    Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • Firewalls Revamping Your Policy and Dynamics

    Sponsored by: Barracuda Networks

    In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.

  • Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security

    Sponsored by: Optum

    In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.

  • BYOD: Keeping the Benefits While Staying Secure

    Sponsored by: IBM

    In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

  • How to guard secure data

    Sponsored by: Optum

    IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.

  • How to Craft SSO and IAM Strategies on the Cloud

    Sponsored by: OneLogin

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    Sponsored by: Proofpoint

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Buyer's Essentials: What to Look for in Single Sign-On Technology

    Sponsored by: TechTarget Health IT

    Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.

  • An Introduction to Microsoft Office 365 and Email Security Tools

    Sponsored by: Solarwinds MSP

    In this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: TechTarget Security

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • How can proper BYOD and IoT device onboarding improve

    Sponsored by: RUCKUS Networks

    This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.

  • The IT Security Manager's Guide to Incident Response & Shadow IT

    Sponsored by: Cisco Umbrella

    This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.

  • Dispelling the Shadows Cast Over IT Security

    Sponsored by: Cisco Umbrella

    This guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.

  • The Evolution of Network Security Hardware

    Sponsored by: Aruba Networks

    This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.

  • Deeper Threats Call for Advanced Threat Detection

    Sponsored by: Solarwinds MSP

    Access this e-guide and discover the necessity of having multiple layers of security and employing multiple technologies in the process. Antivirus technologies are fine for a first measure, but finding advanced threats requires deeper network scans.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.