ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Cyber Security 2016 and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Guide to Flexible Working

    Sponsored by: TechTarget ComputerWeekly.com

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

  • Secure Voting

    Sponsored by: TechTarget ComputerWeekly.com

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution

    Sponsored by: Iron Mountain

    This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!

  • Corporate networks: Business 2.0 and beyond

    Sponsored by: SonicWALL

    The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.

  • The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs

    Sponsored by: SonicWALL

    This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.

  • Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

    Sponsored by: Shavlik Technologies

    This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.

  • Lowering Risk by Applying Consistent Security Across All of Your Locations

    Sponsored by: Juniper Networks, Inc.

    Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    Sponsored by: Sophos

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • The Top Five Virtualization Mistakes

    Sponsored by: Vyatta Inc.

    This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.

  • Cisco IT GRC Security Assessment Service

    Sponsored by: Cisco Systems, Inc.

    Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.

  • Web Based Attacks

    Sponsored by: Symantec Corporation

    This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

  • Online Dating: Keeping Your Members Safe from Online Scams and Predators

    Sponsored by: iovation, Inc.

    This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.

  • The Value of Integrated Security

    Sponsored by: Cisco Systems, Inc.

    Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.

  • Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise

    Sponsored by: Symantec Corporation

    This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.

  • eGuide: Essential Guide to Identity & Access Management

    Sponsored by: Information Security Magazine

    This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  • eBook: Encryption 360 Degrees

    Sponsored by: Informa TechTarget

    Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.

  • eBook: Understanding GRC

    Sponsored by: Informa TechTarget

    This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.