ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    Sponsored by: ComputerWeekly.com

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Is Your Front Door Open and Unlocked for Cyber Criminals?

    Sponsored by: Verizon

    When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.

  • Mobile Security Index 2020

    Sponsored by: Verizon

    Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Most organizations are using Amazon S3 to store their sensitive data. While the storage is simple to deploy, it’s proven to be difficult to secure for some organizations. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 are safe and comply with the strictest security regulations.

  • Next-generation technologies and cybersecurity

    Sponsored by: Verizon

    The details of the future of cybersecurity can be daunting, but the world of technology evolves quicker than any species. If your organization is not prepared, it will be under heavy threat, and soon.View this white paper to explore some of the key cybersecurity implications of new and emerging technologies.

  • Brother Secures Access and Reduces Costs with Cloud-based Authentication

    Sponsored by: Thales

    In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).

  • Securing a Hybrid Environment with Strategic Micro-Segmentation

    Sponsored by: Guardicore

    71% of US organizations have reported suffering at least one data breach. What’s worse is that attacks are getting smarter every year, and so new security methods are needed to protect against them, especially in a hybrid cloud environment.This white paper gives a background of microsegmentation as well as 5 steps to do it successfully.

  • Secure Access to Virtual Environments and Private Clouds

    Sponsored by: Thales

    As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.

  • The Changing Face of Data Security: 2020 Thales Data Threat Report

    Sponsored by: Thales

    Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.

  • The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Waver, Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • Cyberattacks on mobile devices are on the rise

    Sponsored by: Verizon

    5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready.This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.

  • DataVisor Scales Multicloud Security & Compliance for Customers

    Sponsored by: Lacework

    In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.

  • The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs

    Sponsored by: Citrix

    As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.

  • Continuous Authentication as the Zero Trust Multiplier

    Sponsored by: BlackBerry

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

  • Key Cybersecurity ‘Windows’ You Need to Close

    Sponsored by: Verizon

    Just as small businesses often don't appreciate their overall cyber risk profile, they typically don't grasp exactly how cybercriminals are breaching their data stores through malware. This article indicates exactly which measures must be taken to effectively defend from cybersecurity threats.

  • Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal

    Sponsored by: Itergy

    After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • 2020 Data Breach Executive Brief

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.

  • Workload Security: Visibility and Analysis for Cloud and Container Workloads

    Sponsored by: Lacework

    The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.

  • Okta Digital Trans Insurance

    Sponsored by: Okta

    Embracing the digital transformation seems to be a growing trend across every industry, and the insurance industry is no exception. In this Okta webinar, join 2 distinguished security leaders as they discuss the challenges and opportunities for digital transformation in the insurance industry.

  • Six-Step Guide to Email Security Best Practices

    Sponsored by: Clearswift

    The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.

  • Reece Group Protects Endpoints and Automates Threat Management

    Sponsored by: BlackBerry

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.