ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • MDM Software: Benefits of Mobile Configuration Management

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.

  • About to Buy Guide: Mobile Device Management Software

    Sponsored by: TechTarget Security

    Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.

  • Mobile Security Software Keeps Corporate Data Safe

    Sponsored by: TechTarget Security

    In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.

  • IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Sponsored by: OpenText Security Solutions

    In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

  • Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World

    Sponsored by: OpenText Security Solutions

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • Mobile Device Security: What Senior Managers Should Know

    Sponsored by: Sophos

    In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: OpenText Security Solutions

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • Threat Prevention Techniques: Best Practices for Threat Management

    Sponsored by: GeoTrust, Inc.

    SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • It’s Time Businesses Wake up to Mobile Security Reality

    Sponsored by: Threat Track Security

    This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Network Security Report: The State of Network Security in Schools

    Sponsored by: Threat Track Security

    Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.

  • Achieve secure mobile access to enterprise applications

    Sponsored by: Oracle Corporation UK Ltd

    This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.

  • Oracle Mobile and Social Service: The Next Step in IAM

    Sponsored by: Oracle Corporation UK Ltd

    As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Evaluating Wireless Intrusion Prevention

    Sponsored by: AirTight Networks, Inc.

    This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • Information Security Magazine - March 2013

    Sponsored by: TechTarget Security

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Sponsored by: TechTarget ComputerWeekly.com

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

  • Information Security Magazine - February 2013

    Sponsored by: TechTarget Security

    In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.

  • Eight Steps to Better Securing Exchange Server 2010

    Sponsored by: Symantec Corporation

    Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.

  • Tripwire VIA System State Intelligence executive brief

    Sponsored by: Tripwire, Inc.

    What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.