ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Research

  • Five Security Considerations for the Mobile Age

    Sponsored by: IBM

    While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.

  • Case Study - System One

    Sponsored by: OpenText Security Solutions

    This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: TechTarget Security

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Threat Prevention Techniques: Best Practices for Threat Management

    Sponsored by: GeoTrust, Inc.

    SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • It’s Time Businesses Wake up to Mobile Security Reality

    Sponsored by: Threat Track Security

    This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.

  • Oracle Database Security: Cost Effective Security and Compliance

    Sponsored by: Oracle Corporation UK Ltd

    Read this exclusive resource that will help you develop a defense-in-depth, inside-out security strategy to better protect your organization from sophisticated, complex data threats.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Network Security Report: The State of Network Security in Schools

    Sponsored by: Threat Track Security

    Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.

  • Closing the security gap: 2012 IOUG enterprise data security survey

    Sponsored by: Oracle Corporation UK Ltd

    This exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information.

  • Complete and Scalable Access Management

    Sponsored by: Oracle Corporation UK Ltd

    This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Unlocking the Opportunity of SIEM Technology

    Sponsored by: TechTarget Security

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

  • The Future of Next-Generation SIEM

    Sponsored by: TechTarget Security

    This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!

  • Security Information Management Systems Aspire to Real-Time Security

    Sponsored by: Hewlett Packard Enterprise

    Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.

  • How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware

    Sponsored by: Infoblox

    Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.

  • Security Information Management Systems and Application Monitoring

    Sponsored by: TechTarget Security

    Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Evaluating Wireless Intrusion Prevention

    Sponsored by: AirTight Networks, Inc.

    This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • Information Security Magazine - April 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • The Health Care Cloud: Increasing the Need for Disaster Recovery

    Sponsored by: HP & Intel®

    This e-guide explores how, as EHR vendors venture into the cloud, the need for improved disaster recovery and security policies is becoming more apparent.

  • Information Security Magazine - March 2013

    Sponsored by: TechTarget Security

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.