ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Buyer's Guide to Antimalware

    Sponsored by: TechTarget Security

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  • E-Guide: How to build a toolset to avoid Web 2.0 security issues

    Sponsored by: TechTarget Security

    Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.

  • Protect sensitive data with multiple layers of loss protection

    Sponsored by: CDW Healthcare

    This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

  • Top Ten IT Systems Management Pain Points

    Sponsored by: Kaseya

    Managing the IT infrastructure for small and mid-sizedcompanies is a thankless job. People just don’tunderstand the expertise, time and patience required.Kaseya presents the top ten IT management pain pointsand our solution for making your life easier.

  • InfoSphere Warehouse 9.7 data sheet

    Sponsored by: IBM

    Access to timely, accurate information is critical as enterprises strive to boost competitiveness and innovation.

  • GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services

    Sponsored by: GlobalSign

    This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.

  • Protect sensitive data with multiple layers of loss protection

    Sponsored by: CDW Healthcare

    This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

  • IT Decision Checklist: Virtual Desktop Infrastructure Security

    Sponsored by: Astaro

    VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.

  • A Pragmatic Approach to SIEM

    Sponsored by: Tripwire, Inc.

    In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.

  • Windows Azure Platform Security Essentials: Module 1 - Security Architecture

    Sponsored by: Microsoft

    In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.

  • E-Guide: Enterprise UTM Security: The Best Threat Management Solution?

    Sponsored by: NETGEAR Inc.

    If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.

  • Application Security Assessment Options

    Sponsored by: Security Innovation

    This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.

  • IT Decision Checklist: Virtual Desktop Infrastructure Security

    Sponsored by: Trend Micro

    Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.

  • eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices

    Sponsored by: RES Software

    Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...

  • Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy

    Sponsored by: Trend Micro, Inc.

    This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.

  • Slipping Through The Cracks Of Web Services To Serve Malware

    Sponsored by: Trend Micro, Inc.

    Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.

  • Threat Containment for Facebook

    Sponsored by: BlueCoat

    This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.

  • Data Leak Protection Planning

    Sponsored by: (ISC)2 UK Ltd

    It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.

  • 10 Steps to Email Security

    Sponsored by: Clearswift

    This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.

  • Meeting the challenges of virtualisation security

    Sponsored by: Trend Micro

    Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges.

  • TechTarget ANZ Securing Virtualised Data Centres E-Book

    Sponsored by: Trend Micro

    Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet, Inc.

    This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

  • Total Economic Impact™ of Trend Micro Enterprise Security

    Sponsored by: Trend Micro, Inc.

    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.

  • Securing Virtualised Environments and Accelerating Cloud Computing

    Sponsored by: CA Technologies

    There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.

  • Privileged user management: It's time to take control

    Sponsored by: CA Technologies

    IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.