ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Managers Research

  • High Alert: Tackling Cybersecurity Overload in 2019

    Sponsored by: Symantec

    Download this e-book for exclusive new research from Symantec that highlights the challenge that CISOs and security leaders face in trying to find, attract and retain cybersecurity professionals.

  • Infographic: 5 ways to achieve a risk-based security strategy

    Sponsored by: ComputerWeekly.com

    In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

  • CyberConverged Data Storage

    Sponsored by: RackTop Systems

    Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.

  • CyberConverged Storage Designed for the Creative Process

    Sponsored by: RackTop Systems

    Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.

  • CyberConverged Storage: An Overview

    Sponsored by: RackTop Systems

    Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.

  • Getting a Handle on Data Exposure

    Sponsored by: RackTop Systems

    The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.

  • Our Own Worst Enemy: Tackling the Social Engineering Problem

    Sponsored by: RSA Conference

    As it turns out, the weakest link in any cybersecurity solution is...us. With hackers using social engineering scams to fool people into giving up personal information, what's the best way to address this growing issue? Download this podcast transcript for an expert discussion on how to positively impact employee behavior.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • Proofpoint Security and Compliance for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • 2018-2019 Global Application & Network Security Report

    Sponsored by: Radware

    This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.

  • Your App Security Stack: How to Defend Against the Evolving Threat

    Sponsored by: Arxan

    In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.

  • Trust But Verify: Mobile App Protection Best Practices

    Sponsored by: Arxan

    This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.

  • Network Security that's Built Right In

    Sponsored by: 128 Technology

    Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.