ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Verizon Risk Report

    Sponsored by: Verizon

    Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.

  • Avoid Authentication Anarchy: How to Choose your Authenticator

    Sponsored by: HID Global

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

  • Security Automation Best Practices

    Sponsored by: Rapid7

    While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.

  • Cybersecurity Driver's Ed. Operating Behaviors Bound for a Breach

    Sponsored by: Avast Software

    In order to safeguard your business from hackers or unauthorized users, you must take proper security precautions to stay secure. Download this infographic for the do's and don'ts of cybersecurity best practices today.

  • Next-Generation Device Security is Essential for Healthcare Providers

    Sponsored by: Lenovo and Intel

    This custom article takes a look at recent cyberattacks: breaking down where they originate, who they target, and how they operate. Find out how you can bolster your security posture by strengthening your device protection and authentication tools.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Don't Let Security Concerns Stop You From Embracing Mobility

    Sponsored by: Samsung Electronics

    How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • Endpoint Protection Platforms

    Sponsored by: CrowdStrike

    An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file based malware, to detect and block malicious activity, and to provide capabilities needed to respond to security incidents. This Gartner Peer Insights report provides peer reviews and ratings of EPPs. Download the report to explore the EPP market.

  • The SOAR Buyer's Guide

    Sponsored by: Splunk Services UK Ltd

    Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.

  • 2018-2019 Global Application & Network Security Report

    Sponsored by: Radware

    This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.

  • IBM i Encryption: How to Protect Your Database

    Sponsored by: HelpSystems

    Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.

  • The Seven Essential Capabilities of an Analytics-Driven SIEM

    Sponsored by: Splunk Services UK Ltd

    There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.

  • ASICS Automates Incident Management and Resolution With Real-Time Log Analysis

    Sponsored by: Splunk Services UK Ltd

    In order for ASICS to combat cyberthreats and address incidents at the very moment they occur, ASICS required a central platform to manage, correlate and analyze logs generated from multiple systems. In this case study, learn about the ASICS' experience using Splunk Enterprise.

  • Network Security that's Built Right In

    Sponsored by: 128 Technology

    Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.

  • How to Reduce Security Risks through Better DNS Visibility & Analysis

    Sponsored by: Corelight

    In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.

  • AutoNation Speedily Addresses Hygiene and Improves Endpoint Security

    Sponsored by: Tanium

    In an effort for AutoNation to improve visibility and patch management, they deployed Tanium's endpoint security platform. As a result, AutoNation accomplished a comprehensive security hygiene assessment that validated the suspected patching deficiencies of the existing software deployment process. Learn more in this case study.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Top 10 cyber crime stories of 2018

    Sponsored by: ComputerWeekly.com

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

  • IT Security Gap: Ponemon Survey Solution

    Sponsored by: Aruba Networks

    The IT security gap's size and complexity is growing rapidly. With an increasingly mobile user experience, cloud solutions and IoT access to IT networks, building a cyber-defense is more challenging. In this resource, learn about a survey run by Ponemon Institute and Aruba which explores what makes the IT security gap so difficult to close.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Definitive Guide to Software-Defined Perimeter Security

    Sponsored by: Cyxtera

    Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.

  • Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security

    Sponsored by: Auth0

    Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.

  • Closing the Cybersecurity Gap

    Sponsored by: Splunk Services UK Ltd

    Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.