ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Virtualization-Based Security - External Key Management

    Sponsored by: Thales

    Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.

  • AT&T Managed Threat Detection and Response

    Sponsored by: AT&T Cybersecurity

    Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.

  • Consistent Security Posture, Firewalls in Minutes and Reduced Latency – Autodesk’s Cloud Transformation Story

    Sponsored by: Fortinet, Inc.

    As part of a virtual data center project, Autodesk required that each of its Amazon Virtual Private Cloud (VPC) instances had its own firewall. That was a large task due to the hundreds of VPCs Autodesk had. In this webinar, learn how Fortinet’s Virtual Next-Gen Firewall consistently manages it security posture across all Amazon VPCs.

  • How to Implement a Software-Defined Network Security Fabric in AWS

    Sponsored by: Fortinet, Inc.

    Software-defined networking (SDN) is revolutionizing the way businesses are implementing and managing network architecture. The security benefits of SDN are also well-spoken, and now, security teams can create a fabric using SDN to secure virtual private cloud environments. Jump into this SANs webcast to explore SDN security fabric in AWS.

  • Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale

    Sponsored by: Okta

    Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.

  • Fidelis Extended Detection and Response (XDR)

    Sponsored by: Fidelis

    Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.

  • The Future of CIAM: 4 Trends Shaping Identity and Access Management

    Sponsored by: Okta

    As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.

  • Global CISO Playbook for the New Normal

    Sponsored by: Fidelis

    It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.

  • Enterprise Data Protection Solutions, Explained

    Sponsored by: Forcepoint

    It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.

  • Pipl: The Online Identity Information Company

    Sponsored by: Pipl

    Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.

  • The Neo-Security Architecture

    Sponsored by: Curity AB

    The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.

  • Adapt to Long-Term Remote Work with Adaptive Access Policies

    Sponsored by: Okta

    Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.

  • How the Security Inversion Impacts User and Data Protection

    Sponsored by: Netskope

    Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.

  • Surviving Beyond the New Normal: It's More than Securing Your Remote Workers

    Sponsored by: Okta

    The last few months have changed the way IT needs to operate. Organizations' directory structures need to be able to handle quick moves to new cloud applications and other systems. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD, with its many dependencies on 20-year-old AD technology.

  • Fortinet FortiGate: Bridging the cloud security gap

    Sponsored by: Fortinet, Inc.

    Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.

  • Zero-Trust Network Access

    Sponsored by: NetMotion

    If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, then chances are you’re exploring more flexible network access options, but you still want to keep your VPN. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.

  • Security and Compliance Automation for Financial Services

    Sponsored by: Red Hat and Intel

    A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.

  • Vendor Portfolios for Secure Web Gateways

    Sponsored by: Netskope

    Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.

  • Axis Keeps Cardenas Markets Well-Stocked & Well-Protected

    Sponsored by: Axis Security

    For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.

  • A New Vision for Secure Web Gateways

    Sponsored by: Netskope

    The rise of remote work and the shift towards the cloud has impacted nearly every aspect of how we work. Gartner’s 2020 Magic Quadrant report for Secure Web Gateways (SWG) highlighted these impacts and recognized Netskope as a leader in this area – read this article to find out why.

  • IAM: Globalization & Large-Scale Enterprise

    Sponsored by: IC Consult

    A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).

  • Customer Identity and Access Management – The Master Key for Digital Markets

    Sponsored by: IC Consult

    In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.

  • SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces

    Sponsored by: Netskope

    SASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.

  • Keeping Remote Workers Safe and Your Work Secure

    Sponsored by: Forcepoint

    As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists

  • Enterprise Edge and Cloud Security: A Buyer’s Guide

    Sponsored by: Forcepoint

    Determining which cloud security vendor is right for your organization can be challenging. As more people work remotely and there are more ways to connect to the cloud, providing reliable security has never been more important. Read this cloud security buyer’s guide for exclusive evaluating criteria to help you choose with confidence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.