ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Secure Anywhere, Protect Everywhere

    Sponsored by: Cisco Umbrella

    Now more than ever: You need visibility, control and protection across users, files, and the internet. In this e-book, learn how Cisco Umbrella and Cisco AMP for Endpoints provide your first and last lines of defense for today's threats, anywhere users go.

  • TITUS Classification for OWA

    Sponsored by: TITUS

    Titus Message Classification for OWA is a classification and policy enforcement tool that ensures all OWA emails and meeting requests are classified before they are sent. Read on to learn more about the key capabilities of Titus Message Classification for OWA.

  • Top Ways Your Cloud Approach Is Burning Cash

    Sponsored by: Lacework

    In this e-book discover 5 ways your cloud approach could be burning cash and how Lacework can help.

  • Enhancing Security Automation

    Sponsored by: TITUS

    Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Forrester Report: A Practical Guide to a Zero-Trust Implementation

    Sponsored by: Okta

    Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don’t know how to implement it, or they feel daunted by the shifts in strategy and architecture that Zero Trust demands. Read this Forrester report to learn the building blocks of a successful Zero-Trust implementation roadmap.

  • Insider Threat Management - Securing the Remote Worker and Enabling Business Continuity

    Sponsored by: Proofpoint

    In this brief, learn how a people-centric Insider Threat Management solution can help provide the necessary context around user and data activity to protect against costly data loss, system misuse and/or brand damage that can be caused by remote insiders.

  • Barracuda Lightboard: CloudGen Firewall

    Sponsored by: Barracuda

    In this short video, learn about Barracuda CloudGen Firewall, a family of physical, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure.

  • Titus Classification for G Suite. Protect what matters most to your business

    Sponsored by: TITUS

    In this data sheet, discover the benefits and key capabilities of Titus Data Classification for G Suite, a security solution that allows users to easily and confidently identify, classify, secure and share sensitive information within the flow of work.

  • Titus deployment options

    Sponsored by: TITUS

    Titus is building multiple deployment methods across their suite of data protection solutions. Tap into this data sheet to learn about their SaaS and on-premise deployment options.

  • The Anatomy of a Phishing Attack

    Sponsored by: Farsight Security

    Access this infographic to dive into the anatomy of a phishing attack and how to protect your organization from these threats.

  • A Visual Guide to Insider Threat Investigations

    Sponsored by: Proofpoint

    What does an insider threat mean? The truth is, at times, it can be very abstract. And while there is value in understanding the principles and best practices that underlie a strong security program, it can also be very helpful to see for yourself what a given process actually looks like. Download this e-book to learn more.

  • Titus Classification for Desktop

    Sponsored by: TITUS

    View this data sheet to learn all about the benefits and key capabilities of Titus Classification for Desktop.

  • Shifts in Underground Markets: Past, Present, and Future

    Sponsored by: Trend Micro

    This research paper presents a wide-ranging view of dark web marketplaces and underground cybercriminal forums. It delves into notable trends and market movements within these selling environments. Read on to uncover predictions on the goods and services Trend Micro expects to be on the rise in the next three years.

  • 2020 Trustwave Global Security Report

    Sponsored by: SingTel

    This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.

  • Executive Summary 2020 Thales Data Threat Report

    Sponsored by: Thales

    Each year, Thales conducts a Data Threat Report alongside IDC to analyze threats and trends in order to better understand the data security landscape. This year’s report looks at digital transformations, cloud-native data, quantum computing and more. Download the full report for insights, statistics and key takeaways for improving data security.

  • Secure Remote Access Readiness: Webinar

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Secure Remote Access Readiness: Podcast

    Sponsored by: Pulse Secure

    Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.

  • Stop targeted attacks and data loss on Exchange

    Sponsored by: Armorblox

    While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.

  • Stop Phishing and Data Loss on Box

    Sponsored by: Armorblox

    While the widespread adoption of file-sharing applications – like Box – enable collaborative and agile communications, these tools also expose data visibility and security gaps. Download this solution brief to learn more about Armorblox for Box, a cloud security platform designed to prevent phishing attacks and data loss on Box.

  • How to Build an Effective Cloud Network Security Strategy

    Sponsored by: Vectra AI

    Security professionals in companies that use cloud and care about security must continually rethink and retool strategy and security tools and services. Use this collection of expert guidance to learn how best to secure cloud computing.

  • Data Protection at Home and in the Cloud

    Sponsored by: ProAct

    Current events have forced more employees than ever before to work from home, and many employers are struggling to protect their data as they adjust to this new way of doing things. Watch this video to learn how you can safeguard your employees and your company’s data infrastructure as you adapt to the realities of working through COVID-19.

  • Why Cyber Risk Visibility is the Key to Security

    Sponsored by: Verizon

    As companies move from on-premise legacy systems to the hybrid cloud, they are massively increasing their attack surface. More places to attack mean that it’s more likely that a vulnerability will be missed. That’s why the first step to effective cyber risk management is to prioritize visibility. Read on to find out how.

  • Zero-Trust Security: Help Protect Your Workloads

    Sponsored by: Rezilion

    Traditional firewalls just won't cut it when it comes to container security in the public cloud. Zero-trust models are a better approach, but they demand some careful upfront work. Tap into this e-guide for everything you need to know about zero-trust security today.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.