ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Who Owns Cloud Security?

    Sponsored by: OneNeck IT

    As cybersecurity risks become more numerous, sophisticated and expensive, businesses are scrambling to fortify their defenses and running into an important question: Who actually owns cloud security? Download this white paper to find out.

  • Evaluating Vulnerability Risk Management Providers

    Sponsored by: Rapid7

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • Top 5 Security Trends to Watch

    Sponsored by: CenturyLink

    Cybercrime is continuing to evolve, and cybercriminals are developing new ways to target businesses across the globe. In this infographic, explore current trends that CenturyLink believes organizations should be aware of today to help keep themselves secure.

  • Automation Is a Security Pro’s Best Friend

    Sponsored by: FireMon

    The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.

  • Introduction to DevSecOps

    Sponsored by: Contrast Security

    Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.

  • Security for Microservices: Best Practices

    Sponsored by: Aporeto

    Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.

  • Understanding the Mobile Threat Landscape

    Sponsored by: IBM

    With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.

  • Channel Security Experts Deep Dive: The Anatomy of an MSP Breach

    Sponsored by: Datto, Inc.

    In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.

  • 5 Best Practices in Cloud Security for Aviation

    Sponsored by: ShieldX

    It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.

  • Securing Office 365 Against Data Loss and Advanced Threats

    Sponsored by: Datto, Inc.

    Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.

  • Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day

    Sponsored by: Datto, Inc.

    Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • Harnessing Containers for the Big Data Era

    Sponsored by: Aporeto

    With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • Morphisec 2019 Hospitality Guest Cybersecurity Threat Index

    Sponsored by: Morphisec, Inc.

    As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.

  • RMM & Patch Management: The First Line of Defense Against Cyber Threats

    Sponsored by: Datto, Inc.

    Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.

  • Cybercrime The New Downtime Threat to SMBs

    Sponsored by: Avast Software

    A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.

  • Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services

    Sponsored by: Avast Software

    Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • x86 to LinuxONE Redbook

    Sponsored by: IBM

    LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. In this white paper, learn about the process of migrating from x86 to LinuxONE.

  • Assessing the Security and Compliance Posture of an AWS Account and Its Assets

    Sponsored by: CloudPassage

    CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.

  • Unified Data Protection for Hybrid IT: Part 1

    Sponsored by: Forcepoint

    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In this webinar, explore how companies should rethink data security by focusing on the 3 main principles including analytics-driven visibility, risk-adaptive controls and intelligence & dynamic automation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.