ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • How to Design IoT Infrastructure in 7 Parts

    Sponsored by: ARM

    As with any new technology, getting started with IoT presents many challenges, starting with setting up IoT infrastructure. Organizations can prepare their IoT deployments for success by understanding each IoT infrastructure component and how they all work together. In this e-guide, explore the 7 key components of IoT infrastructure.

  • Empowering Business Innovation: Ricoh USA, Inc. Partners for Success

    Sponsored by: Dell SecureWorks

    In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • How to Secure Operational Technology

    Sponsored by: Fortinet, Inc.

    The consequences of a successful intrusion into operational technology (OT) are serious. In businesses that rely on operational and industrial production systems, the chief information security officer (CISO) must ensure that security teams have the right architectural defenses in place. Read this checklist for 7 considerations for securing OT.

  • Building Robust Defenses with Limited Resources

    Sponsored by: Kaspersky Lab

    91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.

  • The Cloud Governance Playbook 2020

    Sponsored by: Rackspace

    The Cloud Governance Playbook 2020 provides readers with extensive guidance, best practices and recommendations as they relate to the modern barriers to cloud governance. Read on to leverage the expertise and findings from Rackspace & AWS’ research and ensure your organization is on track.

  • McAfee MVISION Cloud Security: 360° Shared Responsibility Model

    Sponsored by: Duo

    Shared responsibility models are a core pillar of any effective security and compliance strategy. However, despite awareness of the need, organizational adoption isn’t where it should be. Download this white paper for an in-depth look at the 360˚ Shared Responsibility Model, including a look at its core capabilities and adoption best-practices.

  • Incorporate Information Protection into Microsoft Teams from the Start

    Sponsored by: Nucleus Cyber

    Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.

  • Boost Hybrid Cloud Security

    Sponsored by: Red Hat

    As security evolves, so too do threats. In a world that is quickly moving to cloud architectures (94% of organizations are using some type of cloud), security has never been prioritized more. The cost-saving benefits of cloud are all proven, but without the right security, the risk is not worth the gain. Dive into this e-book to learn more.

  • CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper

    Sponsored by: Thales

    The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.

  • Stopping Zero Days at The Speed of Digital

    Sponsored by: Checkpoint Software Technologies

    Most organizations are ill-equipped to handle the threat of zero-day cyberattacks. This e-book, Stopping Zero Days at The Speed of Digital, highlights 3 best practices that can help organizations better identity and mitigate these threats without compromising productivity – read on to get started.

  • Best Practices for Cloud Data Protection and Key Management

    Sponsored by: Thales

    In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).

  • CipherTrust Cloud Key Manager

    Sponsored by: Thales

    To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.

  • SecOps Cybersecurity Best Practice Guide

    Sponsored by: Covestic

    Cybersecurity incidents impact your bottom line. If you need evidence, Equifax’s breach cost them an estimated $4 billion in revenue. On a smaller scale, legal fees of cybersecurity litigation can cost about $2.5 million. The next step in your security journey may cost less than you think. Open this guide for 5 cybersecurity best practices.

  • University Hospital Gets the Most Out of Mobility with Total Access Control

    Sponsored by: PortSys

    For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.

  • Taking a Disruptive Approach to Security

    Sponsored by: VMware International Unlimited Company

    In a survey of 30 IT and security leaders across Europe, at least 73% said they found IT hygiene, finding security talent and integrating security products to be extremely challenging. The presence of these challenges means that leaders need to take an alternative, more disruptive approach to security. Open this e-book to learn specifics.

  • Enhancing the Modern Workplace with Hardware-Enforced Security

    Sponsored by: Servium

    An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • SailPoint Predictive Identity

    Sponsored by: SailPoint Technologies

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.