ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • The Impact Of Xdr In The Modern Soc

    Sponsored by: VMware

    Extended detection and response (XDR) is flourishing in the security arena. ESG, a division of TechTarget, recently surveyed IT/InfoSec pros across multiple industries to better understand the market perception of XDR, the value points and the challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • Why You Should Take Security In The Cloud

    Sponsored by: Splunk

    Advanced security attacks are getting harder to detect as hackers are becoming more sophisticated. Organizations can get ahead of these attacks by adopting a cloud analytics-driven security platform. Register for your complimentary copy of “Why You Should Take Security in the Cloud” and learn how to combat changing security threats.

  • Are you Ready for XDR?

    Sponsored by: McAfee

    If your security team is struggling with limited time, resources and intelligence – or if you’re trying to get a security operations center (SOC) off the ground – then the time has come to seek out more visibility. View this webinar to learn how extended detection and response (XDR) can help eliminate network, endpoint and cloud blind spots.

  • The Fundamental Guide To Building A Better Soc

    Sponsored by: Splunk

    There simply isn’t enough skilled security talent out there, and that which does exist is expensive. So what are companies who rely on dinosaur technology to do? They need to start building a next generation, modern SOC, today. Download your complimentary copy of The Fundamental Guide to Building a Better Security Operation Center (SOC) today.

  • A Scalable Security Data Platform

    Sponsored by: ChaosSearch

    Read this white paper to learn how log analytics platforms like ChaosSearch can help you process huge amounts of log data, use this data to identify and act on threats, and deal with advanced security issues like advanced persistent threats.

  • Royal Holloway: Testing antivirus efficacy in Linux

    Sponsored by: ComputerWeekly.com

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

  • The Business Value of iboss cloud Enterprise Security Solutions

    Sponsored by: iBoss

    Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.

  • Retiring Web Access Management (WAM)

    Sponsored by: Okta

    Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.

  • Universal Directory: Create One World.

    Sponsored by: Okta

    Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.

  • How To Protect Your Business By Limiting Attack Dwell Time

    Sponsored by: Viavi

    For security teams, it may be more realistic to assume that successful attacks against your IT resources can and will occur, rather than trying to prevent them altogether. For such an approach to work, you must minimize the dwell time of attacks. Examine this white paper to see how VIAVI’s Observer platform could help you do so.

  • Internal Firewalls for Dummies

    Sponsored by: VMware

    Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.

  • 7 Experts on Transitioning to MDR

    Sponsored by: GoSecure

    Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.

  • Securing Microsoft Office 365 and Other Azure Applications with Ciphertrust Cloud Key Broker for Azure

    Sponsored by: Arrow & Thales

    Today’s customers expect easy-to-use services, only paying for what they need. However, while they want more of these services, they either can’t or won’t give up control of their data for security reasons. Check out this white paper to see how the CipherTrust Cloud Key Broker for Azure aims to address this issue through key management.

  • Burdens of Homegrown Customer Identity that Hinder Digital Transformation

    Sponsored by: Okta

    When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.

  • Use Group Rules to Automate & Granularly Manage Access

    Sponsored by: Okta

    Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.

  • Simplify and Strengthen your Strategy with Intrinsic Security

    Sponsored by: VMware

    Organizations are hampered by having to manage too many bolted-on security solutions. Teams are often siloed, so they work with limited context and information on the potential impact of threats. Intrinsic security lets your leverage your existing infrastructure to unify security and IT. Dive into this e-book to see how it works.

  • S7 E48 Cisco Business Critical Services For A Holistic Cisco SecureX Environment

    Sponsored by: Cisco Systems, Inc.

    Hear a discussion about Cisco SecureX – a unified security operations platform that automates workflows to save skilled security teams from hours of tedious manual work. You’ll also learn how supplementing SecureX with Cisco Business Critical Services can help organizations secure their workplaces and workforces in this era of increased attacks.

  • Cisco Cloud Mailbox Defense

    Sponsored by: Cisco Umbrella

    Your Office 365 migration is paying off, but you have new questions and challenges about how best to secure your new cloud environment. Are you adequately protected from threats without controlling your internal mail? Leverage this data sheet to learn how Cisco’s Cloud Mailbox Defense strives to keep your cloud mailboxes safe.

  • Forrester CMD Webinar

    Sponsored by: Cisco Umbrella

    Access this Forrester webinar to learn some of the biggest challenges faced by security pros at organizations of all sizes and what they’re doing to overcome security risk. And discover Cisco Cloud Mailbox Defense, a new email security product engineered with the aim to help security pros address email threats and overcome these challenges.

  • Cybereason Video 2 – Live Attack Simulation

    Sponsored by: Cybereason

    Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.

  • Thales Data Protection for a Multi-Cloud World

    Sponsored by: Arrow & Thales

    The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.

  • Umbrella - Cisco TV - Transforming IT security with SASE - English

    Sponsored by: Cisco Umbrella

    With the adoption of cloud-delivered services, SD-WAN has proved that it can deliver improved application performance, reduced costs and simplified branch operations. But despite all these benefits, security remains one of the biggest concerns. Leverage this webinar to see how SASE can deliver multiple security functions from the cloud.

  • Umbrella - SASE in 15 minutes- English

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Turning Knowledge into Power

    Sponsored by: Trend Micro

    Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.

  • MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE

    Sponsored by: Trend Micro

    Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences