ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • TrueSight Cloud Security

    Sponsored by: BMC

    Download this resource to learn how TrueSight Cloud Security can automate security and compliance checks and remediation across your multi-cloud platforms.

  • Illusive Networks Attack Risk Assessment

    Sponsored by: Mitigate Solutions

    In the Illusive Networks Attack Risk Assessment, discover how an attack risk assessment can help identify hidden vulnerabilities in your network to minimize the risk of high-impact cyber events.

  • TITUS Intelligent Protection

    Sponsored by: TITUS

    TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.

  • Compliance Needs Drive Data Access Auditing Requirements

    Sponsored by: BMC

    More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.

  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy

    Sponsored by: Forcepoint

    Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.

  • Access & Protect Your Data – Anywhere, Anytime

    Sponsored by: TITUS

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

  • Securing Your Cloud Applications

    Sponsored by: Forcepoint

    Today, the average enterprise customer uses over 1,000 cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure. In this webcast, learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security tools can help with discovery, enforcement and risk assessment.

  • The State of the CASB Market

    Sponsored by: Forcepoint

    With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.

  • Turbocharge ITOps Productivity for Security and Efficiency

    Sponsored by: BMC

    It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.

  • TITUS Military Classification Tool

    Sponsored by: TITUS

    In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.

  • TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification

    Sponsored by: TITUS

    One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.

  • Security Automation with Ansible

    Sponsored by: Red Hat

    Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.

  • IT Transformation Challenges and How to Address Them

    Sponsored by: Dell EMC

    Read this article to learn how you can overcome such challenges by providing employees with the tools they need to make more informed decisions and work more efficiently.

  • Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell EMC

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Understanding Human Behavior to Reduce Risk

    Sponsored by: Forcepoint

    New technologies have changed the way we interact with our data and rendered the old threat-centric security model obsolete. It has also made it much harder to identify good and bad behavior leading to an ambiguous "gray space". In this webcast, learn how adopting a human-centric approach can give IT visibility into the gray space and reduce risk.

  • Protecting Against Threats with Updated Application Security Testing

    Sponsored by: WhiteHat Security

    In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.

  • A Guide to Achieving SaaS Security and Compliance

    Sponsored by: Forcepoint

    The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.

  • Real-Time Mainframe SIEM 101

    Sponsored by: BMC

    SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe SIEM initiative. Also explore 4 steps to ensure malicious mainframe activity triggers a notification to the appropriate security system.

  • California Consumer Privacy Act and the Role of IAM

    Sponsored by: WSO2, Inc.

    Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.

  • Can You Handle Your Data?

    Sponsored by: TITUS

    The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.

  • Cloud Access Security Broker- Market Quadrant 2018

    Sponsored by: Forcepoint

    Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.

  • Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science

    Sponsored by: Forcepoint

    Cybersecurity is traditionally very good at identifying activities that are black or white—either obviously bad or clearly good. But there is a wide "gray space" between black and white, full of activities that are less clear. In this white paper, learn how to determine the best course of action in ambiguous scenarios.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell EMC

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • Magic Quadrant for Application Security Testing

    Sponsored by: Synopsys

    In this Gartner Magic Quadrant report, discover 11 AST vendors and how they stack up. Some of these vendors include, Synopsys, Veracode, IBM, WhiteHat Security, and more. Read on to see how these vendors stack up.

  • The CISO's Ultimate Guide to Securing Applications

    Sponsored by: Synopsys

    In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.