ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Application security: best practices and risks

    Sponsored by: ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • Channel Security Experts Deep Dive: The Anatomy of an MSP Breach

    Sponsored by: Datto, Inc.

    In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.

  • How Machine Learning Can Help You Keep up with Current Threats

    Sponsored by: Appian

    Can AI and machine learning (ML) systems actually help solve IT security problems and protect against threats moving forward? Download this e-guide for more expert insights into the potential AI and ML can bring to your organization’s proactive security measures.

  • Securing Office 365 Against Data Loss and Advanced Threats

    Sponsored by: Datto, Inc.

    Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.

  • Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day

    Sponsored by: Datto, Inc.

    Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.

  • RMM & Patch Management: The First Line of Defense Against Cyber Threats

    Sponsored by: Datto, Inc.

    Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Sponsored by: Barracuda

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS

    Sponsored by: Aporeto

    In this case study, dive into the benefits and solutions that Informatica received when utilizing Aporeto’s Cloud PAM to provide them with comprehensive visibility and better control over their sprawling environment.

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

  • Identity and Access Management: Automated Peace of Mind

    Sponsored by: Imprivata

    Inside, discover how your healthcare organization can benefit from an identity access management (IAM) solution purpose-built for healthcare, and learn how an IAM can help your organization ensure immediate access to vital patient care information, check test results from mobile, meet DEA requirements, and more.

  • How Employees can Jeopardize your Cybersecurity

    Sponsored by: Mimecast

    Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, discover several email-related activities that employees often engage in that contribute to the spread of these "hidden" threats and learn what measures your organization can take to protect itself from these attacks.

  • MicroScope – October 2019: What's next for the channel?

    Sponsored by: MicroScope

    The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

  • Phoenix Children's Takes on Cybersecurity

    Sponsored by: Blackberry Cylance

    In this case study, learn how Phoenix Children's Hospital used CylancePROTECT to help protect against attackers hacking into patient data and disrupting hospital operations.

  • Vermont Electric Case Study

    Sponsored by: Nozomi Networks

    Watch this short video about Vermont Electric Cooperative Inc., as Chris Smith discusses the challenges of robust cybersecurity and how he overcame these challenges.

  • Okta + Shape: Stopping Identity Attacks in their Tracks

    Sponsored by: Shape Security

    In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.

  • Top 10 Reasons Customers Choose Proofpoint to Protect Office365

    Sponsored by: Proofpoint

    For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Transparent Data Movement Solution Overview

    Sponsored by: RackTop Systems

    Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.