ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software White Papers

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • Infographic: 2019 Europe IT Priorities - Security

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Break the Link Between Users and Cyber Threats

    Sponsored by: Avast Business

    Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.

  • Business Case for Web Isolation

    Sponsored by: Menlo Security

    As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.

  • Isolation: A Part of the Modern Security Architecture

    Sponsored by: Menlo Security

    Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.

  • CW Middle East ezine April 11 2019

    Sponsored by: ComputerWeekly.com

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Security Orchestration and Automation Solutions

    Sponsored by: Rapid7

    One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.

  • How to Deploy SOAR

    Sponsored by: D3 Security

    SOAR platforms are revolutionizing security operations by adding cutting-edge technology to the critical processes of reacting to, and mitigating the damage of, cyberattacks, data breaches, and other adverse events. In this white paper, explore the process of deploying a SOAR platform, and the important considerations at every stage.

  • Cybersecurity Driver's Ed. Operating Behaviors Bound for a Breach

    Sponsored by: Avast Software

    In order to safeguard your business from hackers or unauthorized users, you must take proper security precautions to stay secure. Download this infographic for the do's and don'ts of cybersecurity best practices today.

  • Don't Let Security Concerns Stop You From Embracing Mobility

    Sponsored by: Samsung Electronics

    How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.

  • IBM i Encryption: How to Protect Your Database

    Sponsored by: HelpSystems

    Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.

  • Cloud-Based Secure Web Gateways

    Sponsored by: Menlo Security

    The secure web gateway marketplace continues to be dominated by appliances; however, the rapid growth of cloud services is becoming a disruptive force. Many vendors have added cloud access security broker functionality through partnerships or acquisitions. In this Gartner Magic Quadrant, discover strengths and cautions for vendors in the field.

  • Top 10 IT security stories of 2018

    Sponsored by: ComputerWeekly.com

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

  • Infographic: 6 emerging trends in security

    Sponsored by: ComputerWeekly.com

    In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.

  • Buyer's Guide: Security Orchestration, Automation, & Response

    Sponsored by: Splunk

    This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.

  • Choosing the WAF That's Right for You

    Sponsored by: F5 Networks

    The Verizon Data Breach Investigations Report reveals that in 2017, there were more than 2,200 confirmed data breaches. Web Application Firewalls (WAFs) can help to mitigate these breaches, but how do you pick the right one? Ask yourself these 4 questions to find out.

  • Bringing Security to the Perimeter of your Cloud Network

    Sponsored by: Cisco Umbrella

    With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.

  • How Yelp Securely Connects People with Great Local Businesses

    Sponsored by: Cisco Umbrella

    At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.

  • Using & Protecting Microservices: A Double-edged Sword

    Sponsored by: ThreatX

    Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of ThreatX to learn about a Web Application Firewall platform that can help secure your microservices.

  • Defending Your Network from Cryptomining

    Sponsored by: Cisco Umbrella

    Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • CW Nordics August 2018

    Sponsored by: ComputerWeekly.com

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • The Essential Guide to Security

    Sponsored by: Splunk

    With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.