ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • Peer Insights: Identity Governance and Administration

    Sponsored by: SailPoint Technologies

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Identity Governance & Administration (IGA)

    Sponsored by: SailPoint Technologies

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • Privileged Access Management

    Sponsored by: CyberArk Software, Inc

    Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • SailPoint Predictive Identity

    Sponsored by: SailPoint Technologies

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Combating Threats with the DDoS Defenders at Tata

    Sponsored by: TATA Communications

    In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.

  • Protecting Intellectual Property with Data Access Governance

    Sponsored by: SailPoint Technologies

    In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • Duarte Unified School District Protects Students while Fostering Engagement

    Sponsored by: Absolute Software Corporation

    Luckily for the Duarte Unified School District, when the Coronavirus pandemic first broke out, the LA County educational district already had in place a robust one-to-one student device program. However, this didn’t address the access, connectivity, and student support challenges. Read this case study for more on Duarte’s COVID-19 response.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • The Future of Security and Compliance Starts Here

    Sponsored by: SailPoint Technologies

    The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.

  • Intelligent Cloud Identity Platform

    Sponsored by: SailPoint Technologies

    To address the cybersecurity challenges that result from a undergoing a digital transformation, organizations are implementing intelligent identity and access management practices. This solution brief provides an in-depth look at the key features and capabilities of SailPoint’s IdentityIQ platform, read on to see the benefits.

  • Cybersecurity and Education: The State of the Digital District in 2020

    Sponsored by: Absolute Software Corporation

    K-12 schools are rapidly embracing technology to augment current curriculums by enabling innovative learning paths for students in the event they can’t be in the classroom. This report provides an overview of the key risks, trends and recommendations from Absolute’s recent study into the state of digital education.

  • Implementing the NIST Cybersecurity Framework in Government

    Sponsored by: Absolute Software Corporation

    The NIST Cybersecurity Framework outlines 5 functions that, when implemented properly, help organizations drive efficiency while ensuring data security. In this whitepaper focuses on how the NIST Cybersecurity Framework can – and should – be implemented to address the rising cybersecurity challenges in the public sector.

  • StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

    Sponsored by: Bitdefender

    This investigation report compiles Bitdefender’s key findings from the information they gathered on StrongPity, a threat group that renown for their government-sponsored population surveillance and intelligence attacks. Download the report to learn more about StrongPity’s motives, tactics and infrastructure.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    Sponsored by: SailPoint Technologies

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences

    Sponsored by: DivvyCloud

    In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.

  • The Cost of a Data Breach in Healthcare: Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute Software Corporation

    Protected Health Information (PHI) has quickly become the most attractive target for cybercriminals – especially full patient dossiers that include driver’s licenses, health insurance information and other sensitive data. Download this white paper for a look at specific data breaches and discover a set of key trends and lessons learned.

  • Achieving HIPAA Compliance: Your Guide to Avoiding HIPAA and HITECH Penalties

    Sponsored by: Absolute Software Corporation

    The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.

  • Cyberthreat Hunting Guide

    Sponsored by: Bitdefender

    Threat hunting is the proactive search for cyber threats within a network, including those that have already slipped past endpoint security defenses. In today’s security zeitgeist, it is more commonplace to use AI and machine learning to hunt threats as it can keep networks ahead of the curve. Read this guide to learn more.

  • Lockdown Lessons: Closing Security Gaps

    Sponsored by: Webroot

    It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.

  • BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool

    Sponsored by: Bitdefender

    A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.

  • SailPoint Identity Now: Certification Creation

    Sponsored by: SailPoint Technologies

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.