ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)

    Sponsored by: IBM

    This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.

  • Unlock security success: Is security intelligence the key?

    Sponsored by: IBM

    This report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more.

  • The Use Case for Integrated Vulnerability Management CORE Security

    Sponsored by: Core Security Technologies

    This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: TechTarget Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

  • Secure the Extended Enterprise

    Sponsored by: TechTarget CIO

    CIOs and analysts discuss strategies for extending the reach of enterprise security management in this SearchCIO handbook.

  • BYOD Security Policy, not MDM, at Heart of Smartphone Security

    Sponsored by: TechTarget Security

    This expert guide discusses how effective policies can solve corporate mobile device security issues, and why these policies are better at protecting smartphones than an MDM solution.

  • SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS

    Sponsored by: TechTarget Security

    This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • Enhancing End-to-End Cloud Security: Part 3

    Sponsored by: Intel Security

    This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.

  • Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them

    Sponsored by: Symantec Corporation

    This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.

  • Simplify and Consolidate Data Protection for Better Business Results

    Sponsored by: IBM

    This informative resource examines a tool that provides advanced visualization, built-in analytics and integrated workflow automation features that dramatically simplify backup administration to streamline problem resolution and simplify data protection.

  • Symantec Website Security Threat Report

    Sponsored by: Symantec Corporation

    This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.

  • September Information Security Magazine

    Sponsored by: TechTarget Security

    Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • EssentialEnterprise Mobile Device Security Controls and Policies

    Sponsored by: TechTarget Security

    In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.

  • ShareFile Enterprise Overview

    Sponsored by: Citrix Systems, Inc.

    Workshifting and BYOD trends are adding new challenges for IT who already struggle with protecting intellectual property and observing compliance regulations. This white paper explains how to use enterprise-grade file sharing technology to regain control over sensitive corporate while meeting mobility and collaboration needs of end users.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Computer Weekly special report: Managing mobile security and user access control

    Sponsored by: BlackBerry

    Learn why mobile devices are forcing organizations to change the way they think about security.

  • Getting a better grip on mobile devices

    Sponsored by: IBM

    This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.

  • The SMB Cloud Atlas

    Sponsored by: TechTarget CIO

    Access this expert resource to find out CIOs are reaping the benefits of cloud computing while still ensuring security, privacy and cost are appropriately managed.

  • E-Guide: Evaluating network security virtualization products

    Sponsored by: Sophos

    This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: TechTarget Security

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  • Use BYOD Policies to Integrate Personal Devices Securely

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com highlights the importance of implementing effective BYOD policies to ensure the security of your health care data. Moreover, learn how to embrace BYOD without compromising compliance.

  • Cloud security concerns you must address

    Sponsored by: HP & Intel®

    This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.