ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Security Research

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Cybercrime Tactics and Techniques: Ransomware Retrospective

    Sponsored by: Malwarebytes

    In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.

  • Building supply company boosts endpoint security with Malwarebytes

    Sponsored by: Malwarebytes

    In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.

  • Q&A with Mary Ann Miller

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role of security plays in the world of mobile banking applications. Read on to learn more.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky

    Sponsored by: Tehama

    Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.

  • What is Tehama?

    Sponsored by: Tehama

    Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.

  • Pervasive Protection: Enabling Secure Work from Anywhere

    Sponsored by: Malwarebytes

    The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.

  • Buyer’s Guide Digital Identity Verification

    Sponsored by: Mitek Systems, Inc.

    Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • Endpoint Protection

    Sponsored by: Malwarebytes

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

  • Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints

    Sponsored by: Cisco Umbrella

    An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.

  • Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi

    Sponsored by: Cisco Umbrella

    In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.

  • Endpoint Security Suites, Q3 2019

    Sponsored by: Checkpoint Software Technologies

    Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats. This Forrester Wave report shows how 15 endpoint security suite providers measure up and helps security and risk professionals select the right one for their needs.

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Sponsored by: Intertrust

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • Respond to the Changing Mobility Landscape

    Sponsored by: Smarsh

    As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.

  • Considering Wi-Fi 6

    Sponsored by: Extreme Networks

    As enterprises evaluate Wi-Fi 6, it’s important to understand which components are useful and which are hype. In this white paper, discover everything about Wi-Fi 6 which includes Wi-Fi 6 buying tips, Wi-Fi usage and challenges across industries and more.

  • Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC

    Sponsored by: PortSys

    Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.

  • Security Readout: 2019 Trends for Remote and Roaming User Security

    Sponsored by: Cisco Umbrella

    It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.

  • Protection Inside and Outside the Office: The New State of Cybersecurity

    Sponsored by: Cisco Umbrella

    Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.

  • Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access

    Sponsored by: Cisco Umbrella

    Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.

  • Courier Prevents Shipping Fraud

    Sponsored by: Shape Security

    A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.

  • Top 10 North American Bank Eliminates Credential Stuffing

    Sponsored by: Shape Security

    A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.