ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

  • How to guard secure data

    Sponsored by: Optum

    IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.

  • How to Craft SSO and IAM Strategies on the Cloud

    Sponsored by: OneLogin

    Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    Sponsored by: Proofpoint

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Buyer's Essentials: What to Look for in Single Sign-On Technology

    Sponsored by: SearchHealthIT.com

    Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.

  • An Introduction to Microsoft Office 365 and Email Security Tools

    Sponsored by: Solarwinds MSP

    In this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • How can proper BYOD and IoT device onboarding improve

    Sponsored by: Ruckus Wireless

    This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.

  • The IT Security Manager's Guide to Incident Response & Shadow IT

    Sponsored by: Cisco Umbrella

    This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.

  • Dispelling the Shadows Cast Over IT Security

    Sponsored by: Cisco Umbrella

    This guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.

  • The Evolution of Network Security Hardware

    Sponsored by: Aruba Networks

    This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.

  • Deeper Threats Call for Advanced Threat Detection

    Sponsored by: Solarwinds MSP

    Access this e-guide and discover the necessity of having multiple layers of security and employing multiple technologies in the process. Antivirus technologies are fine for a first measure, but finding advanced threats requires deeper network scans.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • The top threat intelligence services for enterprises

    Sponsored by: UnitedLex

    If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.

  • The Need-to-Know of Today's Cloud Security

    Sponsored by: SearchCloudComputing.com

    In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.

  • Why it's Time for Locked-Down Desktops

    Sponsored by: Dell, Microsoft and Citrix

    Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell, Inc. and IntelĀ®

    This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.