ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Spending Research

  • HPE Cyber Security Best Practices to Protect Your Business

    Sponsored by: TechData

    Cyberattacks have become an increasingly dangerous threat in recent years, growing in volume, complexity and severity. This solution brief offers Hewlett Packard’s cybersecurity best practices, including a 6-step cybersecurity approach with offerings that coincide with each step – read on to get started.

  • Cybersecurity in the Remote Work Era: A Global Risk Report

    Sponsored by: Keeper Security Inc

    One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.

  • The Complete Guide for Preventing Costly Data Leaks for UK Local Governments

    Sponsored by: Zivver

    For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.

  • Cloud Adoption and Risk Report

    Sponsored by: McAfee

    The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.

  • Securing Public Clouds: Understand the Cloud Shared Responsibility Model

    Sponsored by: Radware

    As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.

  • Endpoint Security: Protecting Your Business Wherever It Goes

    Sponsored by: Dell SecureWorks

    The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.

  • How Much is Too Much Cybersecurity Noise?

    Sponsored by: Dell SecureWorks

    For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.

  • Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs

    Sponsored by: Dell SecureWorks

    Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.

  • Generations of Machine Learning in Cybersecurity

    Sponsored by: BlackBerry

    Access this white paper to learn the 5 characteristics that define a generation of machine learning and analyze the 5 generations themselves to discover how to improve future machine learning cyber security initiatives.

  • Singapore Nonprofit PPIS Secures Centers with Help from BlackBerry and Partner ACE Pacific Group

    Sponsored by: BlackBerry

    With the world having changed the way it does business, security professionals have had to place a lot of emphasis on endpoint security and, more specifically, threat detection and response. Want to learn more? View this impressive case study to learn how a nonprofit in Singapore was able to prepare for the unexpected.

  • HPE Security Analysis and Roadmap Service

    Sponsored by: TechData

    In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.

  • Behavioral Solution for Online Fraud Prevention

    Sponsored by: Buguroo

    Buguroo was recently announced as winners of the 2020 Frost & Sullivan Best Practices Award for their innovative behavioral biometrics solution – which looks to help organizations in the banking and financial services industry detect and prevent fraud. Read this report to learn more about Buguroo’s award-winning offering.

  • Innovate with Intention: Intelligence to Guide Innovation and Manage Risk.

    Sponsored by: Spirent

    The “innovation gap” is often the term given to the difference between an organization’s desire to innovate and their material innovation progress. This executive brief attempts to explain the reasoning for the gap by addressing common misconceptions and highlighting how security can be used to accelerate innovation.

  • See and Defend Cloud Workloads with CrowdStrike and AWS

    Sponsored by: AWS & CrowdStrike

    Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.

  • Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria

    Sponsored by: Cysiv

    SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.

  • Ransomware Prevention and Remediation

    Sponsored by: BlackBerry

    According to a recent study, 62% of organizations were victimized by ransomware – 58% of which opted to pay the ransom. As this threat vector becomes more lucrative for cybercriminals, expect these numbers to go up. So, what can be done about ransomware? Read this solution brief for BlackBerry’s answer.

  • The New Reality

    Sponsored by: BlackBerry

    Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.

  • What is Security's Role in Digital Transformation?

    Sponsored by: Rackspace

    The past few years have seen massive upticks of digital transformations – offering businesses the ability to enhance the speed, agility and quality of their DevOps teams and lifecycles. But given the current threat landscape, it's critical to understand the role of security in digital transformations – read on to learn more.

  • Don’t Compromise on Security in a Crisis

    Sponsored by: BlackBerry

    As organizations encourage their employees to work from home as a measure of personal health and safety, criminals are looking to take advantage of the transition period as an entry point for their cyberthreats. In this white paper, discover how to achieve effective remote worker security that doesn’t sacrifice efficacy.

  • Multicloud Security Services

    Sponsored by: Rackspace

    As cloud migration continues to grow in popularity, organizations are beginning to realize that traditional cybersecurity approaches are ill-fitted to address the security needs of cloud environments. Watch this webinar to discover how Rackspace and Google Cloud are working together to address these threats.

  • Remote Work Is the Future

    Sponsored by: BlackBerry

    Remote work is quickly becoming a new reality for the foreseeable future. In this case study, discover what led ConvergeOne, a professional and managed services provider in North America, to partner with BlackBerry and explore the outcomes of their remote work project.

  • Akamai Moves into Web Browser Security with Page Integrity Manager

    Sponsored by: Akamai Technologies

    Malicious script activity has emerged as a new way for cybercriminals to conduct credit card skimming and other types of attacks. This 451 Research report provides a comprehensive overview of the Akamai Page Identity Manager, designed to combat this growing threat.

  • Governance, Risk, and Compliance Book of Knowledge

    Sponsored by: ServiceNow

    Governance, risk, and compliance (GRC) is becoming a staple when it comes to risk management and meeting regulatory requirements. Read on to unlock the Governance, Risk, and Compliance Book of Knowledge and discover why organizations are opting for GRC tools and the benefits they’re realizing.

  • IT-GRC Tools

    Sponsored by: ServiceNow

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

  • What is Okta Access Gateway

    Sponsored by: Okta

    Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.