ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • How to Simplify Security and Shrink the Attack Surface

    Sponsored by: VMware

    Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.

  • Real-World Customer with Secure Application Infrastructure

    Sponsored by: VMware

    In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.

  • How to Protect Your VDI Environment from Ransomware

    Sponsored by: Fhoosh

    One major security risk to VDI environments is ransomware. Ransomware has the potential to be more damaging in VDI than in a physical desktop environment. In this e-guide, explore 3 tips IT administrators can take to better secure VDI environments.

  • 5 Principles of Effective IT Security

    Sponsored by: VMware

    Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.

  • CloudCheckr is the Engine Driving Cloud Governance at Siemens

    Sponsored by: Cloudcheckr

    Railigent monitors the physical infrastructure required to keep rail transportation reliable and safe, but turned to CloudCheckr to ensure the cloud infrastructure it relies on is just as secure. In this case study, learn how CloudCheckr has streamlined Railigent's security protocols to ensure developers can easily identify security issues.

  • Welcome to the Future of Cyber Security: Top 5 Cloud Security Challenges

    Sponsored by: Checkpoint Software Technologies

    Businesses are rapidly migrating workloads and data to public cloud environments to improve efficiencies, drive innovation and increase responsiveness to market conditions. While the cloud provides numerous benefits there are also some rather unique security challenges. In this white paper, explore the top 5 security challenges in the public cloud.

  • Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement

    Sponsored by: Ziften

    38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.

  • 5 Steps to Selecting an Enterprise Anti-Virus Replacement

    Sponsored by: Ziften

    Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.

  • Understanding What's at Stake with Privileged Accounts

    Sponsored by: One Identity

    In this webinar, listen to two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sponsored by: HackerOne

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • The Total Economic Impact Of Alert Logic SIEMless Threat Management

    Sponsored by: Alert Logic

    Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.

  • Come Hack With Me: The Anatomy of a Data Breach

    Sponsored by: Radware

    Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.

  • Podcast: Privileged Account Governance and Incident Response

    Sponsored by: One Identity

    A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.

  • Privileged Account Governance and Incident Response

    Sponsored by: One Identity

    A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this webcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.

  • How to Capitalize on the Multi-billion Dollar Market for Managed Security Services

    Sponsored by: IBM

    Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.

  • Aeris and ROAMWORKS: Protecting Cargo from Security Challenges

    Sponsored by: Aeris

    To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.

  • Explore Enterprise Network Firewalls

    Sponsored by: Forcepoint

    There are many options for Enterprise Network Firewalls, which all provide a variety of protection features. Although they all offer a standard set of features, there are often signification differences in each option. In this Gartner Magic Quadrant, explore the strengths and cautions of key vendors in the Enterprise Network Firewalls market.

  • Understanding the Limitations of Microsoft Office 365 Security

    Sponsored by: Forcepoint

    Tune into this webcast where CEO and founder of Osterman Research, Mike Osterman, discusses the key findings of an Office 365 study and organizations' priorities around email security.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • Solution Brief: A Unified-Client Platform for Enterprise-Grade Endpoint Security

    Sponsored by: SonicWall

    With the growth of ransomware and the persistent use of credential theft, endpoints are the battleground of today's threat landscape. That's why many turn to SonicWall Capture Client for advanced behavior-based malware protection, cloud sandbox file testing, and web threat protection. Download this brief to learn more about the benefits today.

  • The State of Email Security Report 2019

    Sponsored by: Mimecast

    Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.

  • Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security

    Sponsored by: Proofpoint

    From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.

  • Quantifying the Operational and Security Results of Switching to Forcepoint NGFW

    Sponsored by: Forcepoint

    The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.