ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • SOC-as-a-Service versus DIY SOC

    Sponsored by: Arctic Wolf

    Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.

  • State of the Channel Ransomware Report: Canadian Edition

    Sponsored by: Datto, Inc.

    More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.

  • To SIEM or Not to SIEM, Find Out Your Options

    Sponsored by: Arctic Wolf

    With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).

  • Managed Print Services Solutions & support services

    Sponsored by: Xeretec

    A Managed Print Service (MPS) offers businesses a quick and simple way to reduce costs and improve productivity. But with so many solutions on the market, how do you ensure that your MPS will overcome the unique needs of your organization? Download this brochure to explore the benefits of a personalized MPS.

  • The Values of Both Building Your Own SOC and Buying SOC-as-a-Service

    Sponsored by: Arctic Wolf

    SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.

  • Manage Risk and Compliance with ServiceNow GRC

    Sponsored by: ServiceNow

    The global regulatory environment continues to evolve making it imperative for organizations to have an integrated risk program. Are you well-positioned to monitor, prioritize, and automate response to business risks in real time? Learn about ServiceNow GRC – an option that could help you ensure rapid identification and response to risk.

  • Magic Quadrant for Security Awareness Computer-Based Training

    Sponsored by: MediaPRO

    End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.

  • TLS 1.3: Are you Ready?

    Sponsored by: F5 Networks

    Read this white paper to discover a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.

  • Infographic: 6 emerging trends in security

    Sponsored by: ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • Forcepoint Cloud Access Security Broker (CASB)

    Sponsored by: Forcepoint

    ESG Lab evaluated the Forcepoint Cloud Access Security Broker (CASB) to validate how it secures the use of any cloud applications across an organization's users and endpoints. Discover how Forcepoint CASB helps organizations minimize security vulnerabilities in three key areas.

  • Buyer's Guide: Security Orchestration, Automation, & Response

    Sponsored by: Splunk

    This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.

  • The SIEM that Gives SIEM a Good Name

    Sponsored by: Empow Cyber Security

    Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.

  • Bringing Security to the Perimeter of your Cloud Network

    Sponsored by: Cisco Umbrella

    With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.

  • How Yelp Securely Connects People with Great Local Businesses

    Sponsored by: Cisco Umbrella

    At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.

  • Using & Protecting Microservices: A Double-edged Sword

    Sponsored by: ThreatX

    Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of Threat X to learn about a Web Application Firewall platform that can help secure your microservices.

  • Defending Your Network from Cryptomining

    Sponsored by: Cisco Umbrella

    Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • CW Nordics August 2018

    Sponsored by: ComputerWeekly.com

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • Fraud Management Solution Buyer's Kit

    Sponsored by: Riskified

    Using e-commerce can make you more accessible to customers but also raise the threat of fraud. Lower the risk by implementing a fraud management solution that can help actively monitor and prevent fraudulent activity. Download this comprehensive guide to selecting the best fraud solution for you.

  • VxRail Cybersecurity Solutions Overview

    Sponsored by: Dell EMC and VMware

    Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.

  • Choosing the WAF That's Right for You

    Sponsored by: F5 Networks

    The Verizon Data Breach Investigations Report reveals that in 2017, there were more than 2,200 confirmed data breaches. Web Application Firewalls (WAFs) can help to mitigate these breaches, but how do you pick the right one? Ask yourself these 4 questions to find out.

  • Manage Risk by Protecting the Apps and Data That Drive Business Productivity

    Sponsored by: Citrix

    Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.

  • Tailoring Intelligence for Automated Response

    Sponsored by: IntSights

    In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.

  • The Essential Guide to Security

    Sponsored by: Splunk

    With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.