ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Webinar: What's New in iOS 12 Security

    Sponsored by: Data Theorem

    This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.

  • Business Case for Web Isolation

    Sponsored by: Menlo Security

    As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.

  • Isolation: A Part of the Modern Security Architecture

    Sponsored by: Menlo Security

    Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Security Orchestration and Automation Solutions

    Sponsored by: Rapid7

    One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.

  • How to Deploy SOAR

    Sponsored by: D3 Security

    SOAR platforms are revolutionizing security operations by adding cutting-edge technology to the critical processes of reacting to, and mitigating the damage of, cyberattacks, data breaches, and other adverse events. In this white paper, explore the process of deploying a SOAR platform, and the important considerations at every stage.

  • Cybersecurity Driver's Ed. Operating Behaviors Bound for a Breach

    Sponsored by: Avast Software

    In order to safeguard your business from hackers or unauthorized users, you must take proper security precautions to stay secure. Download this infographic for the do's and don'ts of cybersecurity best practices today.

  • Don't Let Security Concerns Stop You From Embracing Mobility

    Sponsored by: Samsung Electronics

    How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.

  • Technology's Role in Data Protection - The Missing Link in GDPR Transformation

    Sponsored by: Micro Focus & PwC

    The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.

  • IBM i Encryption: How to Protect Your Database

    Sponsored by: HelpSystems

    Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.

  • Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology

    Sponsored by: Fidelis

    Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.

  • Cloud-Based Secure Web Gateways

    Sponsored by: Menlo Security

    The secure web gateway marketplace continues to be dominated by appliances; however, the rapid growth of cloud services is becoming a disruptive force. Many vendors have added cloud access security broker functionality through partnerships or acquisitions. In this Gartner Magic Quadrant, discover strengths and cautions for vendors in the field.

  • The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018

    Sponsored by: Security Scorecard

    According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.

  • Corelight Webcast: New SIEM on the Block -- Meet Humio

    Sponsored by: Corelight

    Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Predictive Analytics in Defense and Security

    Sponsored by: Dataiku

    Data is growing exponentially, but insights from that data are growing linearly because people alone can't keep up. This is where machine learning and AI come in to play. This e-book details the challenges you'll face in defense and security, and offers a powerful solution.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • SOC-as-a-Service versus DIY SOC

    Sponsored by: Arctic Wolf

    Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.

  • Infographic: 6 emerging trends in security

    Sponsored by: ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • Buyer's Guide: Security Orchestration, Automation, & Response

    Sponsored by: Splunk

    This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.

  • Bringing Security to the Perimeter of your Cloud Network

    Sponsored by: Cisco Umbrella

    With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.

  • How Yelp Securely Connects People with Great Local Businesses

    Sponsored by: Cisco Umbrella

    At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.

  • Using & Protecting Microservices: A Double-edged Sword

    Sponsored by: ThreatX

    Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of ThreatX to learn about a Web Application Firewall platform that can help secure your microservices.

  • Defending Your Network from Cryptomining

    Sponsored by: Cisco Umbrella

    Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.