ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) White Papers

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • 10 Capabilities to Look For in an MDR Solution

    Sponsored by: Arctic Wolf Networks, Inc.

    Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.

  • 10 Endpoint Security Problems and How the Cloud Solves Them

    Sponsored by: VMware International Unlimited Company

    In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.

  • 10 Ways to Secure and Accelerate a Modern Workforce

    Sponsored by: Cloudflare

    As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • 12 Reasons Why You Need Stronger Mobile App Security

    Sponsored by: NowSecure

    Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.

  • 12 Things You Should Do to Stop Ransomware

    Sponsored by: ThreatLocker

    To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • 2019 Cloud Trends Report

    Sponsored by: Skybox Security

    As organizations continue to embrace the benefits of cloud technologies, they must also be mindful of the additional threats and vulnerabilities that can occur as a result of their transformation. In this report, analyze key trends and challenges related to cloud tools, infrastructures and security across 2019.

  • 2019 CrowdStrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.

  • 2019 Crowdstrike Global Security Attitude Survey

    Sponsored by: CrowdStrike

    In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.

  • 2019 Cybersecurity Report Card

    Sponsored by: DomainTools

    If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.

  • 2019 Proofpoint Domain Fraud Report

    Sponsored by: Proofpoint

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • 2020 Cloud Misconfigurations Report

    Sponsored by: DivvyCloud

    Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.

  • 2020 Cyber Hygiene Report

    Sponsored by: Automox

    Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.

  • 2020 Cybersecurity Outlook Report

    Sponsored by: VMware International Unlimited Company

    The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.

  • 2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence

    Sponsored by: Cisco Umbrella

    As technology enables organizations to improve the way they do business, the cybersecurity landscape evolves to reflect this change – both in terms of cyberattacks and security tactics. This e-book highlights the top cybersecurity trends of 2020, designed to guide organizations towards a secure network, today and in the years to come.

  • 2020 Data Breach Executive Brief

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.

  • 10 Essential Elements for a Secure Enterprise Mobility Strategy

    Sponsored by: Citrix

    This resource guides you through the top 10 considerations when developing a mobile strategy.

  • 10 Must Haves for Secure Enterprise Mobility

    Sponsored by: Citrix

    In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.

  • 10 Network Security Tools and Tests Everyone Should Use

    Sponsored by: Global Knowledge

    This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.

  • 10 Steps for Early Incident Detection

    Sponsored by: Tripwire, Inc.

    The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  • 10 Ways to Build a Better Big Data Security Strategy

    Sponsored by: Hewlett-Packard Enterprise

    This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.

  • 18 Windows 10 Facts IT Must Know

    Sponsored by: VMware

    Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.

  • 2014 Magic Quadrant for User Authentication

    Sponsored by: SafeNet Asia Ltd

    View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.