ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Content Management White Papers

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Secure remote access: More vital than ever thanks to Covid-19

    Sponsored by: ComputerWeekly.com

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

  • Content Filtering: Taming the Wild Web

    Sponsored by: SearchSecurity.com

    Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.

  • Effective Ways to Search Log Files

    Sponsored by: SearchSecurity.com

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • Sleeping Android: the danger of dormant permissions

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.

  • Project Success Plan: Rethinking Enterprise Content Management

    Sponsored by: OpenText

    Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.

  • Buyer's Essentials: What to Look for in an EMM Strategy

    Sponsored by: SearchSecurity.com

    EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.

  • Keep Your Data Secure: Fighting Back With Flash

    Sponsored by: Micron Technology

    Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.

  • Mastering Mobile Application Management: How to Adopt MAM

    Sponsored by: IBM

    Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.

  • Next-Generation Security in a Mobile Era

    Sponsored by: SearchCIO.com

    Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.

  • Mobile Cloud Security: What CXOs Need to Know

    Sponsored by: Cisco Systems, Inc.

    This blog post discusses the need for end-to-end security in a mobile cloud environment.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Mobile at Work: What You Don’t Know Can Hurt You

    Sponsored by: Bluebox

    With the average employee using 21 apps in the workplace, how can IT maintain a secure environment for sensitive company information? View this infographic to see essential facts about how smartphones and tablets are being used in the workplace, and how this effects data security.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Empowering Information Security with Desktop Virtualization

    Sponsored by: Citrix

    In this paper, CSO explores why desktop virtualization should be core to your information security foundation.

  • The Five-Step Guide to Better Social Media Security

    Sponsored by: Hootsuite

    Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.

  • How to Secure Your Microsoft SharePoint Products

    Sponsored by: Thawte Inc.

    This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: Sophos

    This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

  • Kaspersky Endpoint Security 8 for Windows

    Sponsored by: Kaspersky

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • The Moray Council Secures SharePoint Data with TITUS

    Sponsored by: TITUS

    This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.