ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Research

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • IoT Security Testing: Cover All Your Bases

    Sponsored by: Synopsys

    Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • How to Mitigate Shadow Cloud Services Security Risks

    Sponsored by: IBM

    Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • From DevOps to DevSecOps: Integrating Security

    Sponsored by: BMC

    They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • How to Secure Azure and Recover From the Worst Disasters

    Sponsored by: Softchoice Corporation

    In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.

  • The Current Landscape of Advanced Persistent Threats

    Sponsored by: Proofpoint

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

  • How to Approach Storage Disaster Recovery

    Sponsored by: Rubrik

    In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.

  • Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay

    Sponsored by: Trend Micro, Inc.

    In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.

  • Testing the Cloud: Ensuring Enterprise Data is Secure

    Sponsored by: Trend Micro, Inc.

    In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.

  • Managing Information Security Amid New Threats: A Guide for CIOs

    Sponsored by: Cisco Umbrella

    In this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • Build a Cohesive, Effective Security Strategy

    Sponsored by: Splunk

    Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • Firewalls Revamping Your Policy and Dynamics

    Sponsored by: Barracuda Networks

    In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.

  • BYOD: Keeping the Benefits While Staying Secure

    Sponsored by: IBM

    In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

  • Buyer's Essentials: What to Look for in Single Sign-On Technology

    Sponsored by: TechTarget Health IT

    Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: TechTarget Security

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.