ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    Sponsored by: ComputerWeekly.com

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Is Your Front Door Open and Unlocked for Cyber Criminals?

    Sponsored by: Verizon

    When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Most organizations are using Amazon S3 to store their sensitive data. While the storage is simple to deploy, it’s proven to be difficult to secure for some organizations. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 are safe and comply with the strictest security regulations.

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Sponsored by: ComputerWeekly.com

    Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

  • Brother Secures Access and Reduces Costs with Cloud-based Authentication

    Sponsored by: Thales

    In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).

  • Secure Access to Virtual Environments and Private Clouds

    Sponsored by: Thales

    As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.

  • Using Network Segmentation and Micro Segmentation to Improve Enterprise Defense

    Sponsored by: Guardicore

    Security architects have historically taken an absolute approach to defense. Namely, if they build an impenetrable wall, then supposedly no one can get in.The problem is that if a mistake is made and the wall breached, everything behind it is at risk.This webcast covers microsegmentation, which builds many secure compartments rather than one wall.

  • The Changing Face of Data Security: 2020 Thales Data Threat Report

    Sponsored by: Thales

    Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.

  • The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Waver, Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • Cyberattacks on mobile devices are on the rise

    Sponsored by: Verizon

    5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready.This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.

  • DataVisor Scales Multicloud Security & Compliance for Customers

    Sponsored by: Lacework

    In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.

  • The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs

    Sponsored by: Citrix

    As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.

  • Continuous Authentication as the Zero Trust Multiplier

    Sponsored by: BlackBerry

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Cazena Secures Massive Cloud Data Lakes with Lacework

    Sponsored by: Lacework

    Learn how Lacework helped Cazena, a SaaS company that provides cloud-based data lakes as a software service, reduce noise generated by their security stack, identify anomalies in customer environments, increase operational efficiency and more.

  • Executive Summary 2020 Thales Access Management Index

    Sponsored by: Thales

    The 2020 Access Management Index explores access management practices within businesses and the use and importance of two-factor authentication, smart SSO and cloud access management tools. Read on to uncover the key findings.

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

  • 5 Reasons your SMB workspace needs simple SSO

    Sponsored by: Citrix

    SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.

  • Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal

    Sponsored by: Itergy

    After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • 2020 Data Breach Executive Brief

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.

  • Protect Business Critical Cloud Apps in a Multi-Cloud World

    Sponsored by: Oracle Communications

    Employees are required to work from home, and enterprise networks are footing the bill. Are your cloud applications are running with the best combination of security and performance available? Watch this webcast to get an in-depth look at cloud functionality and protection for mission-critical business apps and use cases across multiple industries.

  • Workload Security: Visibility and Analysis for Cloud and Container Workloads

    Sponsored by: Lacework

    The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.

  • Reece Group Protects Endpoints and Automates Threat Management

    Sponsored by: BlackBerry

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.