ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Symantec Web Security Service: Advanced Cloud-Delivered Network Security for the Cloud Generation

    Sponsored by: Symantec

    Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.

  • Choosing the Right Endpoint Security Controls for your Security Lifecycle

    Sponsored by: Symantec

    In the modern world of cloud-enabled digital transformation initiatives, endpoint security has gained importance. This report provides organizations with key points to consider when evaluating endpoint security software such as endpoint protection and endpoint detection and response.

  • Cloud Security: Are You Ready?

    Sponsored by: Symantec

    Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.

  • CloudSOC and Email Security.cloud for Microsoft Office 365

    Sponsored by: Symantec

    Email is the #1 attack vector with 71% of targeted attacks coming from spear phishing emails, according to the 2018 Symantec Internet Security Threat Report. In this solution brief, learn how Symantec CloudSOC CASB and Email Security.cloud for Office 365 can help you secure your email and apps against threats.

  • Data Security for the Way People Work

    Sponsored by: Dell EMC and Microsoft

    Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.

  • Top 10 North American Bank Eliminates Credential Stuffing

    Sponsored by: Shape Security

    A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.

  • Airline Stops Automated Attacks on Web & Mobile

    Sponsored by: Shape Security

    A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.

  • Norfolk County Council Bolsters Productivity with IdentityIQ

    Sponsored by: SailPoint Technologies

    Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.

  • The SIEM Buyer's Guide for 2020

    Sponsored by: Splunk

    The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Proofpoint

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Top 10 Security Changes in Red Hat Enterprise Linux 8

    Sponsored by: Red Hat

    In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.

  • How IT Administrators Are Tackling Active Directory and Security

    Sponsored by: Zoho

    ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.

  • Fortinet 2019 Operational Technology Security Trends Report

    Sponsored by: Fortinet, Inc.

    Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.

  • Securing Industrial Control Systems With Fortinet

    Sponsored by: Fortinet, Inc.

    In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.

  • State of Operational Technology and Cybersecurity Report

    Sponsored by: Fortinet, Inc.

    Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • CISO and Cybersecurity: A Report on Current Priorities and Challenges

    Sponsored by: Fortinet, Inc.

    The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • How to Pick a Winner in EDR

    Sponsored by: Palo Alto Networks

    The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. This research report will break down the results and what it means for your organization as you assess your endpoint security toolkit.

  • How to Boost Your Breach Defense: A 3-Part Plan

    Sponsored by: Micro Focus

    Even the strongest, most protected networks can be brought to their knees with just 1 minor misstep. Thus, the cyber defender has to protect against all attack vectors. In this blog, learn how you can help secure your organization by adopting a 3-part security model consisting of security in depth, DevSecOps, and security validation.

  • Zero Trust Access Today's IT Security Falls Short

    Sponsored by: PortSys

    78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.

  • The Simple Guide to Encryption Key Management

    Sponsored by: Virtru

    In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.

  • Exposing PeopleSoft Self-Service Applications to the Internet

    Sponsored by: Appsian

    Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.