ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • IT And Security Silos: A Spotlight On The APAC Region

    Sponsored by: VMware

    VMware commissioned Forrester Consulting to evaluate the relationship between IT and security teams. These two important organizational pieces tend to disagree with one another. Their leaders plan to consolidate the two, which brings both great challenges and great benefits. Read this report to learn why this is so crucial today.

  • Azure Essentials: Defense in depth security

    Sponsored by: TechData - Microsoft

    As cloud becomes more widely adopted, security across these expanding cloud environments needs to improve to keep pace with modern threats and operational requirements. Watch this video to learn more about Microsoft Azure’s cloud security, management and control capabilities, including how it leverages machine learning.

  • Secure Cloud Computing: Today's Biggest Roadblocks

    Sponsored by: TierPoint MSFT

    Now that the COVID-19 pandemic has pushed most office workers to home-based computers outside of corporate firewalls, there’s more reason for hackers to target the cloud. This article explores today’s biggest cloud security risk areas and how to overcome them – read on to get started.

  • Credit Union Bolsters Security and Compliance Using Arctic Wolf

    Sponsored by: Arctic Wolf Networks, Inc.

    In this case study, discover why Valley Strong Credit Union partnered with Arctic Wolf in order to address growing operational challenges they were facing in regard to securing sensitive customer data with limited IT and cybersecurity resources.

  • Tension between IT and Security Professionals Reinforces Silos and Security Strain

    Sponsored by: VMware

    IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.

  • 10 Cybersecurity Best Practices for Securing Remote Workers

    Sponsored by: Arctic Wolf Networks, Inc.

    As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.

  • Customer Case Bergman Clinics

    Sponsored by: Zivver

    In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.

  • SMBs Need Improved Defenses to Protect Remote Workers

    Sponsored by: Citrix

    Regardless of the outcome of this pandemic, it’s beginning to look like remote work will continue for the foreseeable future – especially among SMBs. In this webinar, explore the increasing risks and opportunities as they relate to securing remote workforces at SMBs, and discover how Citrix’s zero trust platform can help.

  • 5 Must-Haves to Look for in a Best-in-Class IoT Security Solution

    Sponsored by: Palo Alto Networks

    Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.

  • The Healthcare Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.

  • Remediant Secure One Solutions Brief

    Sponsored by: Remediant

    In order to address the growing threat of cyberattacks caused by access mismanagement, Remediant created the zero-standing privilege model to help organizations enhance their identity and access management programs. But what is zero-standing privilege & how does it work? Read this solution brief to find out.

  • 2020 Gartner Magic Quadrant

    Sponsored by: IBM

    Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."

  • The Cost of Insider Threats: Global Report

    Sponsored by: IBM

    The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.

  • The Impact of COVID-19 On IT and Cybersecurity

    Sponsored by: IBM

    What changes were necessary to address the unexpected global pandemic? What types of cybersecurity challenges did the transition present? How are organizations doing? For answers to these questions, read this survey, conducted by ESG, to gain a perspective on the cybersecurity impact of COVID-19 as well as implications for the future.

  • Guide for Cellular IoT Security

    Sponsored by: Emnify

    IoT attacks have been increasing steadily, with certain types of attacks increasing by as much as 900% across 2019. Securing IoT devices, connections and applications is no simple task. Download this e-guide – which highlights an overview of common IoT security threats and best practices – to get started.

  • Endpoint Protection Product Rating Report

    Sponsored by: Cybereason

    Back at the beginning of 2020, NSS Labs conducted an independent evaluation of Cybereason’s Endpoint Protection offering – testing they key capabilities and total cost of ownership. To see the summary of NSS Labs’ results, including an overall product rating, read the following report.

  • Egress Prevent

    Sponsored by: Egress Software Technologies Inc

    An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.

  • Egress Protect

    Sponsored by: Egress Software Technologies Inc

    Email protection strategies often fall short of meeting the necessary compliance and security requirements to adequately secure sensitive data being shared. In this solution brief, explore the key features and capabilities of Egress Protect, designed to intelligently secure emails and large files with the appropriate level of security.

  • Security and IT Ops: Minding the IT Gaps Together

    Sponsored by: Tanium

    Contrary to popular belief, security and IT operations have more in common than they think when it comes to business objectives – differences usually arise when it comes to strategic processes. The following white paper highlights those commonalities and explores avenues for collaboration between these two teams.

  • Endpoint Controls

    Sponsored by: Cybereason

    In order to manage the modern cyberthreat landscape, organizations need security policies that ensure protection and compliance without impacting efficiency. This solution brief provides an overview of the key features of Cybereason Endpoint Security – read on to learn more.

  • SCCM Upgrade Checklist | Automate Patch Management in the Cloud

    Sponsored by: Automox

    The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.

  • Working Remotely is the New Normal

    Sponsored by: Automox

    The shift towards a remote workforce isn’t a novel concept – however it wasn’t until the pandemic first arrived that it became such a widespread priority. To help ensure you’re on the right track, this infographic highlights 5 key considerations for securing your remote workforce without sacrificing efficiency.

  • Data Protection Compliance in the UK

    Sponsored by: Zivver

    GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.

  • TCO Study of WSUs and SCCM

    Sponsored by: Automox

    Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.

  • How to Leverage Endpoint Detection and Response (EDR) in AWS Investigations

    Sponsored by: AWS & CrowdStrike

    Digital transformation and the increased adoption of cloud capabilities has created additional challenges for organizations managing a growing number of endpoints – with security being the foremost challenge. Watch this webinar to join experts at AWS and SANS as they highlight these challenges and best practices for securing cloud endpoints.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.