ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems White Papers

  • Massive Spying Campaign Affects Google Chrome Users

    Sponsored by: ThreatLocker

    By relying on a web browser provider to improve privacy and security protections, organizations put themselves at risk of a zero-day attack. Read this blog post for specific examples of the impacts of malicious Google Chrome extensions and what your organization can do to better prevent them.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • Aligning Cyber Risk Management with Business Performance

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • 2020 Data Breach Investigations Report

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.

  • Defense in Depth: Closing the Gaps in Microsoft 365 Security

    Sponsored by: Mimecast

    While email platforms like Microsoft 365 offer native security features, their ability to address today’s email-based cyberattacks is often called into question. So, how prepared is your organization to stop these threats? Download this white paper to discover security challenges and recommendations for organizations using Microsoft 365.

  • Reece Group Protects Endpoints and Automates Threat Management

    Sponsored by: BlackBerry

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Most organizations are using Amazon S3 to store their sensitive data. While the storage is simple to deploy, it’s proven to be difficult to secure for some organizations. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 are safe and comply with the strictest security regulations.

  • Brother Secures Access and Reduces Costs with Cloud-based Authentication

    Sponsored by: Thales

    In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).

  • Secure Access to Virtual Environments and Private Clouds

    Sponsored by: Thales

    As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.

  • The Changing Face of Data Security: 2020 Thales Data Threat Report

    Sponsored by: Thales

    Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.

  • Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • DataVisor Scales Multicloud Security & Compliance for Customers

    Sponsored by: Lacework

    In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.

  • The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs

    Sponsored by: Citrix

    As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.

  • Continuous Authentication as the Zero Trust Multiplier

    Sponsored by: BlackBerry

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Protect Your Network: Best Practices, Incidents & Other Security Considerations

    Sponsored by: Zones, Inc.

    Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • 2020 Data Breach Executive Brief

    Sponsored by: Verizon

    Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.

  • Workload Security: Visibility and Analysis for Cloud and Container Workloads

    Sponsored by: Lacework

    The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.

  • Six-Step Guide to Email Security Best Practices

    Sponsored by: Clearswift

    The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.

  • Controlling Classified Information

    Sponsored by: Clearswift

    Besides compliance requirements, data loss prevention (DLP) strategies are critical for maintaining good cybersecurity hygiene as well as avoiding financial or reputational damage. To learn more about Clearswift’s flexible and simple DLP offering, download this solution brief.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.

    Sponsored by: Lacework

    In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.

  • Unlock the Value of Your AWS CloudTrail Data

    Sponsored by: Lacework

    As business environments become increasingly complex, threat detection becomes a daunting task. To help overburdened security analysts, Lacework designed a platform to detect anomalies and potential threats within your network, providing you with contextual behavioral analytics. Download this solution brief to learn more about the platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.