ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

  • Cyber Security 2016 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Secure Voting

    Sponsored by: TechTarget ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • Protecting SharePoint Data Long Term

    Sponsored by: Varonis

    This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.

  • The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs

    Sponsored by: SonicWALL

    This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.

  • Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

    Sponsored by: Shavlik Technologies

    This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • Presentation Transcript: The Economics of Endpoint Security

    Sponsored by: Sophos UK

    Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    Sponsored by: Sophos

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Managed Office Protection: Switching from AV to SaaS

    Sponsored by: Panda Security

    Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.

  • Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines

    Sponsored by: DellEMC and Intel®

    This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.

  • The Top Five Virtualization Mistakes

    Sponsored by: Vyatta Inc.

    This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.

  • Cisco IT GRC Security Assessment Service

    Sponsored by: Cisco Systems, Inc.

    Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

  • Cisco Security Solutions - A Reference Guide

    Sponsored by: Cisco Systems, Inc.

    This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.

  • The Value of Integrated Security

    Sponsored by: Cisco Systems, Inc.

    Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.

  • The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies

    Sponsored by: IronKey

    Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.

  • eBook: Virtualization Security

    Sponsored by: Informa TechTarget

    Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.

  • eBook: Encryption 360 Degrees

    Sponsored by: Informa TechTarget

    Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.

  • Presentation Transcript: Automating Virtual Machine Configuration

    Sponsored by: ePlus Technology

    Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.

  • Magic Quadrant for Endpoint Protection Platforms

    Sponsored by: Sophos

    Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.