ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management White Papers

  • Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    According to an Oracle study, 77% of organizations have already adopted cloud services and 10% of those companies describe themselves as heavy users.This resource explores the root cause behind the confusion of the shared responsibility model and offers examples of how enterprises are successfully addressing and embracing the model.

  • Web Application Security in a Digitally Connected World

    Sponsored by: Radware

    According to a recent Ponemon and Radware study, 68% of organizations admit low confidence in their information secure posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.

  • Mitigate the top nine cloud threats with a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • Making the case for a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.

  • The 12 Essential Tasks of Active Directory Domain Services

    Sponsored by: One Identity

    This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.

  • Active Directory Management and Security

    Sponsored by: One Identity

    Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.

  • Threat Intelligence: Cybersecurity's Best Kept Secret

    Sponsored by: CrowdStrike

    Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • Large Network Deployment And Mobile Footprint Strategy

    Sponsored by: Entrust, Inc.

    Explore this case study to gain insight into how a technology provider transitioned to the cloud securely, while protecting sensitive data across its corporate network.

  • Controlling and ManagingPrivileged Access

    Sponsored by: One Identity

    Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.

  • Identity and Access Management for the Real World: The Fundamentals

    Sponsored by: One Identity

    The world of IAM is one of constant change, deadlines, and harsh regulations. This e-book delves into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to these challenges.

  • Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.

    Sponsored by: Juniper Networks

    Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.

  • The 10 Universal Truths of Identity and Access Management

    Sponsored by: One Identity

    IAM is an ever-moving target that has become a large and integral part of IT operations. Explore this white paper to uncover 10 universal truths of IAM to help you evaluate your need for an IAM approach as well as how to implement and optimize its usage.

  • Is it Time to Shift Left?

    Sponsored by: Nexthink

    88% of IT teams report an increase in events and alerts over the last 12 months, according to the Digital Enterprise Journal. Explore this infographic to uncover 5 benefits of shifting your IT teams to reduce incidents and improve security and compliance.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Unlock Business Opportunity without Taking Security Risks

    Sponsored by: Juniper Networks

    This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.

  • The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.

  • A Comprehensive Defense in the Battle to Reduce Risk & Enhance Security

    Sponsored by: One Identity

    Is your IAM approach prepared to secure your enterprise and enable business? This white paper explores how identity analytics can guide your IAM approach in the battle to reduce risk and enhance security.

  • Certificate Management: Policy & Automation

    Sponsored by: Entrust, Inc.

    PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.

  • The Evolution of RBAC Models to Next-Generation ABAC

    Sponsored by: Axiomatics

    In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.

  • The Rise of Machine Learning in Cybersecurity

    Sponsored by: CrowdStrike

    Today, the latest trend in cybersecurity is artificial intelligence, and specifically machine learning (ML). In this 31-page e-book, gain a detailed definition of ML and how you can successfully apply it to your security initiatives like malware detection.

  • Getting Started With Attribute Based Access Control

    Sponsored by: Axiomatics

    How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.

  • Protect High-Value Assets From Internal Security Risks

    Sponsored by: Hewlett Packard Enterprise

    Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.

  • IAM for the Real World: Access Management

    Sponsored by: One Identity

    A large government agency with 250,000 users across its Windows and Unix/Linux environments found that each individual IT-assisted access management activity cost more than $300. Annually, this cost is staggering. Access this white paper to learn how to advance your access management approach with real-world examples from organizations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.