ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits White Papers

  • Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs

    Sponsored by: Dell SecureWorks

    Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.

  • HPE Security Analysis and Roadmap Service

    Sponsored by: TechData

    In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.

  • Choosing the Best Mobility Management Solution

    Sponsored by: BlackBerry

    Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.

  • Compliance Made Easy

    Sponsored by: Armor

    The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.

  • The Ultimate Guide to The NIST Cybersecurity Framework

    Sponsored by: CyberSaint

    In this 10-minute read, understand the purpose, origin, and value of the NIST Cybersecurity Framework, important methods to simplify adoption, and actionable recommendations from compliance and risk expert – read on to get started.

  • End-to-end risk, compliance & audit management

    Sponsored by: Reciprocity Labs

    For today's organizations, managing risk, compliance and audit processes has become a daunting routine. Because of that, organizations are turning to third-party vendors to help with speeding up audit cycles and offering enhanced visibility and risk management. Download this solution brief for an overview of ZenGRC's management platform.

  • Netskope's search for an efficient, scalable and compliance-ready platform

    Sponsored by: Reciprocity Labs

    In this case study, follow Netskope, an international security cloud company, as they partner with ZenGRC in order to implement a platform that saw improvements to compliance audit times, productivity, scalability and decision-making. Read on to unlock the full story.

  • Remediant Framework Mapping and Assessment

    Sponsored by: Remediant

    The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.

  • Achieving ISO 27001 and 27002 Certification with ZenGRC

    Sponsored by: Reciprocity Labs

    The Challenge: Meeting evolving InfoSec mandates, when starting nearly from scratch.

  • Dtex Intercept Next-Gen Insider Threat Platform

    Sponsored by: Dtex

    Insider threats, both malicious and accidental, are a growing concern amongst today’s organizations. The following solution brief highlights the key features and capabilities of Dtex Intercept, an insider threat platform designed to equip users with the ability to proactively identify, categorize and isolate potentially harmful insider behavior.

  • Privileged Account Management for Dummies

    Sponsored by: IBM

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

  • CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport

    Sponsored by: ComputerWeekly.com

    Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    Sponsored by: SailPoint Technologies

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • CISO’s Guide to Reducing Risk with Responsible Disclosure

    Sponsored by: HackerOne

    Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.

  • The Business Case for Cysiv SOC-as-a-Service

    Sponsored by: Cysiv

    Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.

  • Security Leaders Handbook

    Sponsored by: HackerOne

    Stepping into a new security leadership position can feel overwhelming: addressing the immediate security needs as well as setting the right foundation for long-term initiatives isn’t an easy task. To help you navigate the first 90 days of your role, and beyond, download this Security Leaders Handbook, which provides guidance and expertise.

  • Microsoft Data Protection: A Growing Success Story

    Sponsored by: InteliSecure

    In 2017, InteliSecure conducted an evaluation of Microsoft’s data protection capabilities – the results were less than ideal. Since then, Microsoft has made great improvements to the built-in data protection capabilities native to their licensing bundles. Download this e-guide for a closer look at Microsoft’s data protection advances.

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

  • MSPs: The 5 Essentials from Your Endpoint Security Partner

    Sponsored by: Malwarebytes

    When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.

  • Privacy Essentials for Security Professionals

    Sponsored by: BigID

    Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.

  • Discovery-In-Depth: The Path to Data Intelligence

    Sponsored by: BigID

    Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.

  • MITRE ATT&CK Evaluations — APT29

    Sponsored by: Trend Micro

    In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.

  • AWS Security Review by Rackspace and Alert Logic

    Sponsored by: Rackspace

    This infographic provides an overview of Rackspace and Alert Logic’s free cybersecurity review. The goal of the review is to establish a clear understanding of the vulnerabilities within your AWS environment and compare those with industry benchmarks. Read on to learn more about the benefits of participating and find answers to FAQs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.