ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Horace Mann Case Study

    Sponsored by: Siemplify

    In this case study, discover how Horace Mann, an insurance and retirementannuities organization, partnered with Siemplify to consolidate their separate operations teams into a single integrated operation center (IOC), enabling them to focus their resources towards ensuring employee retention and compliance regulations.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.

  • The Cybersecurity Guide: Defending from Threats and Preventing Hacks

    Sponsored by: A-Lign

    Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.

  • Best Practices Award: Email Security Global

    Sponsored by: Mimecast

    The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.

  • Avenue Stores Blocks ATO and Scraping with PerimeterX Bot Defender

    Sponsored by: PerimeterX

    In this case study, discover how Avenue Stores, a leader in plus size fashion, collaborated with PerimeterX to address malicious bot activity they were experiencing including ATO, web scraping, and card fraud.

  • Decluttering Your Security Environment

    Sponsored by: Mimecast

    While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.

  • Insider Threat Management in 2020 – What’s Your Plan?

    Sponsored by: ActivTrak

    Whether malicious or accidental, insider attacks can leave organizations feeling vulnerable and eager to prevent future incidents, and a little bit of consideration can save time and money when incidents occur. Read this white paper to uncover the key areas to consider for your 2020 insider threat program checklist.

  • Moorabool Shire Council Case Study

    Sponsored by: Mimecast

    In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.

  • 5G, AI, Deepfakes and Beyond: The Future of IT and Security

    Sponsored by: Splunk

    The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.

  • Protecting from Bot Attacks with PerimeterX

    Sponsored by: PerimeterX

    In this customer success story, Dan Davis, VP of Technology at Build.com, shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks.

  • Transform the Customer Experience with a Modern Customer IAM Solution

    Sponsored by: Okta

    Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.

  • Splunk IT Security Predictions 2020

    Sponsored by: Splunk

    Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Identity Layer for Web and Mobile Applications

    Sponsored by: Okta

    This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.

  • Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach

    Sponsored by: Optiv

    In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.

  • Are Bots Killing Your Business Intelligence?

    Sponsored by: F5 Networks

    While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.

  • Ransomware Defense Checklist

    Sponsored by: Cisco Umbrella

    The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.

  • Is Noise Pollution Making Your Data Less Secure?

    Sponsored by: F5 Networks

    Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.

  • Evolve your Security Operations Center

    Sponsored by: Optiv

    Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.

  • Easy Ways to Dominate the Securities-as-a-Service Game

    Sponsored by: RapidFire

    Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.

  • Blueprint for PCI Compliance with Network Detective

    Sponsored by: RapidFire

    The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.

  • 2019 LexisNexis True Cost of Fraud Study

    Sponsored by: LexisNexis® Risk Solutions

    A recent study by LexisNexis Risk Solutions was conducted to help safely navigate the increasing risk of fraud. The research was able to provide a snapshot of current fraud trends and key pain points among financial services and lending companies in the US. Continue to this webcast to uncover the insights from the research.

  • Take Care When Fighting Mobile Commerce Fraud

    Sponsored by: LexisNexis® Risk Solutions

    Can you strengthen your defense without making a mess of customer experience? As cybercriminals are getting more sophisticated with their attacks, retailers of all sizes are asking themselves this question. In this white paper, explore what to consider when refining your mobile security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.