ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • Three Must-Have Security Measures to Empower Data Centre Transformation

    Sponsored by: Cisco

    As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning.

  • Third Annual Juniper Networks Mobile Threats Report

    Sponsored by: IBM and Juniper

    This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.

  • Solution Brief: InfoSphere Optim Data Masking Solution

    Sponsored by: IBM

    This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.

  • Three principles to Improve Data Security and Compliance

    Sponsored by: IBM

    In this exclusive white paper, discover three key guiding principles that can help improve data security and compliance. Read on and also learn about how you can ensure that your private data remains private.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data

    Sponsored by: IBM

    IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.

  • Top 5 Myths about Mobile Security

    Sponsored by: Sophos

    This expert paper examines the top five myths about mobile security, detailing why these concepts are mistaken for truth and what you can do to appropriately alter your mobile security profile.

  • 2013 Magic Quadrant for Application Security Testing

    Sponsored by: IBM

    This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.

  • BYOD: The Evolution of Mobile Security

    Sponsored by: TechTarget Security

    This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Beyond the Next Generation: Putting Advanced Network Security To Work

    Sponsored by: IBM

    This informative white paper highlights specific examples of the ways in which these CSN systems put today's more advanced capabilities to work in practical application, rather than catering to one specific capability.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • How to Make Your Business More Flexible & Cost Effective?

    Sponsored by: Panda Security

    Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.

  • Panda Cloud Systems Management: Reports Datasheet

    Sponsored by: Panda Security

    This crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.

  • Panda Cloud Systems Management: Remote Support Datasheet

    Sponsored by: Panda Security

    This exclusive white paper discusses a cloud-based device management solution that lets IT remotely connect to devices, even if they are switched off, and run diagnostics to resolve issues transparently for users.

  • Panda Cloud Systems Management: Monitor Datasheet

    Sponsored by: Panda Security

    This informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.

  • Best Practices for Improving Mobile Data Security

    Sponsored by: TechTarget Security

    This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.

  • Panda Cloud Systems Management: Management Datasheet

    Sponsored by: Panda Security

    Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.

  • Panda Security and Delta Wines - Case Study

    Sponsored by: Panda Security

    Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.

  • Case Study: Accurro Limited and Panda Security

    Sponsored by: Panda Security

    Find out how a building automation and network maintenance organization brought a cloud-based security management tool into its security strategy to encompass full IT support and streamline the management of their security environment.

  • Case Study: Panda Security and Aloq, IT reseller

    Sponsored by: Panda Security

    Read about an IT reseller organization which was able to use a cloud systems management solution in order to automate tasks and streamline IT management, saving time and ensuring a high-quality end user experience.

  • Managing Web Security in an Increasing Challenging Threat Landscape

    Sponsored by: TechTarget Security

    This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.

  • Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    Sponsored by: OpenText Security Solutions

    This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.

  • Cloud security, options and trends

    Sponsored by: CenterBeam

    In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.

  • Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award

    Sponsored by: Sourcefire

    In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.