ComputerWeekly.com Research Library

Powered by Bitpipe.com

WS-Security Research

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Sponsored by: SearchSecurity.com

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

  • Endpoint Detection & Response Is Not Enough

    Sponsored by: Arctic Wolf

    Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.

  • Enterprise Security Architecture

    Sponsored by: ComputerWeekly.com

    Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture.

  • Enterprise Security Architecture – an outsourcer's view

    Sponsored by: ComputerWeekly.com

    Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • Everything Starts with DNS: Making the Internet a Safer Place

    Sponsored by: Farsight Security

    During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.

  • February Essentials Guide on Threat Management

    Sponsored by: SearchSecurity.com

    Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.

  • February Technical Guide on Cloud Compliance

    Sponsored by: SearchSecurity.com

    In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Getting a Handle on Data Exposure

    Sponsored by: RackTop Systems

    The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.

  • Enhance Your Endpoint Security Protection

    Sponsored by: Trend Micro, Inc.

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies

    Sponsored by: Embarcadero Technologies, Inc.

    Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.

  • Enterprise Information Security in Transition

    Sponsored by: IBM

    This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • Enterprise Security Solutions by Trend Micro

    Sponsored by: Trend Micro, Inc.

    This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.

  • Enterprise-Grade Wireless LAN Security

    Sponsored by: Siemens

    This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.

  • Facilitating Enterprise PCI DSS Compliance - Executive Summary

    Sponsored by: Globalscape

    The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Firewalls Revamping Your Policy and Dynamics

    Sponsored by: Barracuda Networks

    In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.

  • Five Critical Steps to Achieving an Effective Application Security Program

    Sponsored by: IBM

    Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.

  • Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets

    Sponsored by: Iron Mountain

    Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: Appthority

    This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.

  • For Secure Access, Passwords Alone Do Not Work

    Sponsored by: Verizon

    This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.

  • Forrester Study: The Total Economic Impact of Oracle Identity Analytics

    Sponsored by: Oracle Corporation

    Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.

Browse by Report Type: WS-Security White Papers | WS-Security Multimedia | WS-Security IT Downloads

See more topics related to: WS-Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.