ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Security Observability: Why Tracing?

    Sponsored by: Traceable

    Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.

  • SonicWall Secure SD-Branch

    Sponsored by: SonicWall

    Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    Sponsored by: ComputerWeekly.com

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

  • Improve Threat Resolution Cycles By Leveraging Dns

    Sponsored by: Infoblox

    Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.

  • Managing Cybersecurity Risk in the Supply Chain

    Sponsored by: HelpSystems

    Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.

  • API Security & the OWASP API Top 10

    Sponsored by: Traceable

    The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.

  • Kaspersky Threat Intelligence

    Sponsored by: Kaspersky

    Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.

  • The Evolution of Security Operations and the Contemporary State of Play

    Sponsored by: Kaspersky

    According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.

  • Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment

    Sponsored by: Kaspersky

    According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.

  • Cybersecurity Is Improving, But Is It Enough?

    Sponsored by: eSentire

    Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.

  • Now’s the Time for an Integrated Cybersecurity Model for Your Work-From-Anywhere Environment

    Sponsored by: NWN Corporation

    Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.

  • API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4

    Sponsored by: Traceable

    Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.

  • 2020 Sans Enterprise Cloud Incident Response Survey

    Sponsored by: Infoblox

    In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.

  • The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *

    Sponsored by: Cisco Umbrella

    Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.

  • Vitens Moves to Cloud Security with BloxOne™ ThreatDefense from Infoblox

    Sponsored by: Infoblox

    Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.

  • Securing Remote Workers In The Age Of Teleworking

    Sponsored by: Infoblox

    Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.

  • Supercharge Incident Response With DDI Visibility

    Sponsored by: Infoblox

    Companies are looking for ways to improve their incident response mechanisms – but some avenues often go unexplored. DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). Access this SANS report to learn how DDI visibility can aid in incident response.

  • Market Guide For Managed Detection And Response Services

    Sponsored by: eSentire

    Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.

  • The 2021 State Of Open Source Vulnerabilities

    Sponsored by: Fossa

    Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.

  • The Total Economic Impact™ Of ServiceNow Security Operations

    Sponsored by: ServiceNow

    With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.

  • Enable & Secure Your Remote Workforce

    Sponsored by: BeyondTrust Corporation

    IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.

  • Automated Pen Testing Vs Breach & Attack Simulation

    Sponsored by: Cymulate

    Attack simulation and penetration testing are popular methods for organizations to find and address potential weaknesses in their security programs – but deciding between pen testing and attack simulation can be tricky. Read this e-guide for helpful tips.

  • Secure by Design Cloud Business Communications Apps & Infrastructure from NWN

    Sponsored by: NWN Corporation

    Integrated security is helping companies mitigate larger attack surfaces created by remote and hybrid work teams. Security postures are shifting from reactive to proactive, and one-size-fits-all approaches are falling by the wayside. View this solution brief to explore how to get a unified view of your entire cloud communications infrastructure.

  • How Cyberattack Simulations Differ From Penetration & Vulnerability Tests

    Sponsored by: Cymulate

    Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.

  • Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix

    Sponsored by: Cymulate

    Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences