ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: Swimlane

    In this Gartner research report, learn about security orchestration, automation and response solutions to help improve security operations centers.

  • Prevent Cyberattacks before they Happen

    Sponsored by: Checkpoint Software Technologies

    In this white paper, discover how to prevent cyberattacks before they happen with Check Point Infinity.

  • Cybersecurity: The Latest Battleground for MSPs

    Sponsored by: SkOUT

    Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.

  • Managed Security for MSPs

    Sponsored by: SkOUT

    Read this white paper to learn how to provide viable cybersecurity monitoring solutions for your customers, how to successfully evolve the SOC, and how to potentially transition to an MSSP.

  • How a Managed Service Provider Adapted to Growing Client Cybersecurity Needs

    Sponsored by: SkOUT

    To learn how LMS found a reliable partner with which they could strategically offer managed security services and ease the concerns of their clients, read the following case study.

  • How to Prevent Data Breaches

    Sponsored by: SkOUT

    How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.

  • What is Phishing?

    Sponsored by: SkOUT

    Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.

  • Anybody Home? Vulnerability Scans vs. Penetration Tests

    Sponsored by: SkOUT

    This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.

  • The Impact of Cyber-Based Financial Fraud

    Sponsored by: SkOUT

    Discover how to defend your business against cyber-based fraud by downloading the following paper, which reviews the 4 most common forms of cyber-based financial fraud, investigates the extent of their impact, and provides several defense strategies.

  • How Spear Phishing Targets the C-Suite

    Sponsored by: Inky Technology

    In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.

  • Proofpoint Security and Compliance for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.

  • Security and Governance for Amazon S3 Data Lakes

    Sponsored by: Okera

    In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.

  • Cutting Bait: How to Identify, Avoid, and Protect Against Phishing

    Sponsored by: SkOUT

    How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.

  • Top 10 cyber crime stories of 2018

    Sponsored by: ComputerWeekly.com

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.

  • Open Source Network Security Tools for Beginners

    Sponsored by: AT&T Cybersecurity

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Verizon Risk Report

    Sponsored by: Verizon

    Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.

  • Avoid Authentication Anarchy: How to Choose your Authenticator

    Sponsored by: HID Global

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

  • Security Automation Best Practices

    Sponsored by: Rapid7

    While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.

  • Cybersecurity Driver's Ed. Operating Behaviors Bound for a Breach

    Sponsored by: Avast Software

    In order to safeguard your business from hackers or unauthorized users, you must take proper security precautions to stay secure. Download this infographic for the do's and don'ts of cybersecurity best practices today.

  • The Transparent Managed Security Handbook

    Sponsored by: Expel

    Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.

  • Don't Let Security Concerns Stop You From Embracing Mobility

    Sponsored by: Samsung Electronics

    How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • Endpoint Protection Platforms

    Sponsored by: CrowdStrike

    An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file based malware, to detect and block malicious activity, and to provide capabilities needed to respond to security incidents. This Gartner Peer Insights report provides peer reviews and ratings of EPPs. Download the report to explore the EPP market.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.