ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Reducing Risks from IoT Devices in an Increasingly Connected World

    Sponsored by: Forescout

    With the rise of automation, remote access, and the ever-expanding Internet of Things, IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. While these devices offer a number of enhancements to our lives, they also introduce new threats. Read on to learn how you can combat IoT threats today.

  • Worldwide Security Information and Event Management Market Shares

    Sponsored by: Splunk

    According to IDC, the worldwide SIEM software market grew to $3.0 billion in 2018, a 12.4% increase year-over-year. The growth is a response to an organization's need to monitor, investigate and respond to security threats. Download the report to learn more.

  • The Dark Side of the API Economy

    Sponsored by: Ping Identity Corporation

    Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Collectively this emerging trend is referred to as the API Economy. In this white paper, KuppingerCole Analysts provide key recommendations on designing a comprehensive and future-proof API security strategy.

  • Passive Isn’t Good Enough: Moving into Active EDR

    Sponsored by: SentinelOne

    As cyberattacks continue to grow in volume and complexity, it’s become more critical than ever for businesses to deploy active endpoint detection and response (EDR) to provide scalability and security to their various endpoints. This whitepaper discusses the differences and benefits of various EDR methods, read on to learn more.

  • How to Drive Success

    Sponsored by: SentinelOne

    The CISO’s job is about balancing risks, balancing expectations and balancing needs. Like any balancing act, it is one that takes practice to perfect. This e-book leverages the expertise of current CISOs to help new CISOs by guiding them through their first 90 days on the job. Read on to learn more.

  • State of the Firewall

    Sponsored by: FireMon

    While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.

  • The Internet of Things (IoT) in a Smart Building

    Sponsored by: Forescout

    When discussing IoT, the definition of what these “things” are can be fuzzy. The IoT also overlaps with previous concepts. To help clarify, this infographic provides an illustration of IoT devices found within a typical smart building network and shows how the systems communicate with one another.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • Future-Proofing Your Information Security Strategy

    Sponsored by: InteliSecure

    In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.

  • Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform

    Sponsored by: enSilo

    With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.

  • Guide to Understanding Ransomware

    Sponsored by: enSilo

    Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. In enSilo’s Guide to Understanding Ransomware, discover everything you need to know about protecting and defending against ransomware.

  • Discover Hidden API Security Vulnerabilities and How to Defend Against Them

    Sponsored by: Ping Identity Corporation

    Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.

  • Protecting Data Capital in Your Organization

    Sponsored by: Dell EMC

    With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.

  • Exposing the Top Ten Cloud Security Myths

    Sponsored by: Palo Alto Networks

    Regardless of where your company is on its cloud journey, security challenges remain, with cyberattacks becoming more complex. Constantly evolving threats & innovations are requiring IT leaders to re-evaluate their cloud security strategies. Dive into this article to uncover the 10 biggest security myths about cloud computing.

  • Simplify, Strengthen & Unify Your Security with Zero Trust Access

    Sponsored by: PortSys

    Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructureIn this data sheet, uncover the benefits & challenges of incorporating a zero-trust approach & gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.

  • Leveraging a Smart Lighting System to Enter a Building Network

    Sponsored by: Forescout

    Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.

  • Video Surveillance System (VSS) Architecture in a Smart Building

    Sponsored by: Forescout

    Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • Password Management with Hitachi ID Password Manager

    Sponsored by: Hitachi ID

    Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential & password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.

  • Asia-Pacific Cloud Security Study

    Sponsored by: Palo Alto Networks

    A recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.

  • How to Use Evaluation Factors to Select the Best Microsegmentation Model

    Sponsored by: ShieldX

    Security and risk management leaders deploying microsegmentation face difficult technical choices, which can be facilitated by Gartner's 4 microsegmentation models. Download Gartner’s research to select which of the 4 models is best suited to your enterprises' needs.

  • Endpoint Security Buyer’s Guide: Protect, Detect, Respond

    Sponsored by: Tanium

    Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.

  • How to Lock Down Git

    Sponsored by: Perforce

    While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.

  • Best practices for secure cloud migration

    Sponsored by: Thales

    The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.