ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

  • CyberConverged Data Storage

    Sponsored by: RackTop Systems

    Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.

  • CyberConverged Storage Designed for the Creative Process

    Sponsored by: RackTop Systems

    Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.

  • CyberConverged Storage: An Overview

    Sponsored by: RackTop Systems

    Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.

  • Getting a Handle on Data Exposure

    Sponsored by: RackTop Systems

    The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.

  • SD-WAN with Enterprise Scale and Security in Action

    Sponsored by: Forcepoint

    Find out how you can manage your network and boost connectivity no matter how spread out your enterprise is with a scalable SD-WAN platform, combined with the industry's top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.

  • 2019 Webroot Threat Report

    Sponsored by: Webroot

    In this 2019 Webroot Threat Report, it details the threat activity throughout 2018, and compares the data with that from years past. Tap into the report to get insights on how you can combat cybercrime today and in the future.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • C-Suite Perspectives: From Defense to Offense - Executives Turn Information Security Into a Competitive Advantage

    Sponsored by: Radware

    In this 2019 Executive Application & Network Security Report, discover the current leading cybersecurity challenges and opportunities for C-suite-level executives.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Managed Detection and Response

    Sponsored by: Rapid7

    Rapid7's Managed Detection and Response (MDR) service offers a combination of expertise and technology to detect dynamic threats quickly across your entire ecosystem. In this service overview, learn more about Rapid7's MDR service and 5 key advantages the service offers.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • How Spear Phishing Targets the C-Suite

    Sponsored by: Inky Technology

    In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.

  • Security and Governance for Amazon S3 Data Lakes

    Sponsored by: Okera

    In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.

  • Quarterly Threat Report

    Sponsored by: Proofpoint

    Learn about the most recent threats in 2019 and how to root them out in email messages, social media posts, and malware samples.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Business Case for Web Isolation

    Sponsored by: Menlo Security

    As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.

  • Isolation: A Part of the Modern Security Architecture

    Sponsored by: Menlo Security

    Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.