ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • 6 Best Practices to Improve Visibility and Accelerate Response

    Sponsored by: ReliaQuest

    The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. In this white paper, learn how automation an simplify security and add content to threats and workflows.

  • Egnyte Security Framework

    Sponsored by: Egnyte

    As organizations continue to create, store and share high volumes of unstructured data, prioritizing its security is more important, and harder, than ever. In this white paper, explore the various aspects to consider for cybersecurity in the age of unstructured data in order to learn how to protect your organization’s sensitive content.

  • Email Security Risk Assessment for Microsoft Office 365

    Sponsored by: Mimecast

    View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • Dutch organisations demand more from government

    Sponsored by: ComputerWeekly.com

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

  • Splunk IT Security Predictions 2020

    Sponsored by: Splunk

    Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.

  • Who should get the technology vote in the UK General Election?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

  • BeyondCorp for the Enterprise

    Sponsored by: Banyan Security

    Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.

  • Stop Threats in their Tracks with Incident Response

    Sponsored by: Cisco Umbrella

    In this infographic, discover 5 ways Cisco Incident Response Services can help you strengthen your readiness and response to attacks.

  • How Connected are your Cyber Operations and Business Objectives?

    Sponsored by: Optiv

    Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Decoding Customer IAM (CIAM) vs. IAM

    Sponsored by: Okta

    While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.

  • Identity Layer for Web and Mobile Applications

    Sponsored by: Okta

    This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.

  • The New Era of Fraud: A Bot-Driven Threat

    Sponsored by: F5 Networks

    With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.

  • Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach

    Sponsored by: Optiv

    In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.

  • Top 5 Reasons to Automate Identity Lifecycle

    Sponsored by: Okta

    As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.

  • Pitney Bowes - Okta + F5 joint case study

    Sponsored by: Okta

    In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.

  • Adding Advanced Capabilities into Today's SOC

    Sponsored by: Optiv

    View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.

  • Consumer Identity Management for the CMO, CISO, and CIO

    Sponsored by: Okta

    As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.

  • Are Bots Killing Your Business Intelligence?

    Sponsored by: F5 Networks

    While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.

  • APIs, digital transformation and the need for a new approach to security

    Sponsored by: Arxan

    Today, most organizations don’t know how many APIs they’ve deployed, let alone if they’re secure. According to recent threat analyses, API exploits are predicted to be the most frequent attack vector in the next two years. Learn how to protect API access from the outside in with this Arxan webinar now.

  • The Journey of Security in a DevOps Environment

    Sponsored by: F5 Networks

    To address the increasing demand for application delivery, organizations are adopting DevSecOps: combining the efficiency of DevOps with modern security practices. But how can security be incorporated without disturbing the development process? In this article, uncover the benefits of incorporating security into your DevOps environment.

  • Ransomware Defense Checklist

    Sponsored by: Cisco Umbrella

    The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.

  • API Security for Dummies

    Sponsored by: Data Theorem

    API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.