ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • About to Buy: Mobile Device Management Software

    Sponsored by: TechTarget Security

    Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase.

  • E-Guide: Improving software with the building security in maturity model

    Sponsored by: TechTarget Security

    This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.

  • Ensuring the security of your mobile business intelligence

    Sponsored by: IBM

    Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.

  • HP Fortify on Demand - Enterprise Software Security in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.

  • Webroot Secure Anywhere Cloud vs. Six Traditional Security Products

    Sponsored by: OpenText Security Solutions

    PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.

  • Interpol, Entrust Develop Advanced Multipurpose SmartCard

    Sponsored by: Entrust, Inc.

    See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL.

  • Enterprise Antivirus Security: How Does Your Solution Stack Up?

    Sponsored by: OpenText Security Solutions

    Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

  • Four Things You Should Know About Securing Your Growing Business

    Sponsored by: Symantec Corporation

    SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.

  • Palo Alto Networks in the Data Center: Eliminating Compromise

    Sponsored by: Palo Alto Networks

    This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.

  • Computer Weekly - 3 April 2012: Data security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.

  • Oracle Database 11g Release 2 High Availability

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Computer Weekly - 13 March 2012: The economics of private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.

  • Microscope - March 2012 - A special issue looking at the opportunities for resellers in the security market

    Sponsored by: MicroScope

    Themed ezine looking at the issues in the security market and the opportunities for resellers

  • The Ten "Must Haves" for Secure Mobile Device Management

    Sponsored by: Zenprise

    Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.

  • Why Free Patch Management Tools Could Cost You More

    Sponsored by: Lumension

    This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.

  • Cybercrime Battle Basics

    Sponsored by: ThreatMetrix

    This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.

  • IBM Collaboration Software for the Apple iPhone and iPad Devices

    Sponsored by: IBM

    Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.

  • Security in Cloud Computing

    Sponsored by: Intel

    The cloud’s virtual environment raises many security concerns in businesses, putting intense pressure on IT professionals to enhance security systems. Access this white paper to discover how you can use technology to take control of the security risks in your enterprise.

  • Oracle Advanced Security with Oracle Database 11g Release 2

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Mobility Advantage: Why Secure Your Mobile Devices

    Sponsored by: Sybase, an SAP company

    The use of enterprise mobile devices is on the rise yet few companies have a mobile security strategy. Get this paper now and see how you can protect your mobile devices and data from unwanted eyes.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Self-Management of Passwords (SMOP) Version 1.1

    Sponsored by: turbo-IT Corporation

    Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs.

  • Comparative Analysis on Endpoint Security Solutions

    Sponsored by: Trend Micro

    As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.

  • Securing Virtualised DataCentres

    Sponsored by: Trend Micro

    Access this e-book to gain insight on securing a virtualised environment. Discover how to tackle virtualisation security issues and set the foundation to move confidently to the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.