ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Externalized Dynamic Authorization in a MicroServices World

    Sponsored by: Axiomatics

    This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).

  • All Together Now: Securing the Internet of Things

    Sponsored by: Juniper Networks

    IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This resource offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.

  • Mobile security trends point to unifying policy and tools

    Sponsored by: SearchSecurity.com

    Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.

  • Freedom Security Alliance Dramatically Accelerates Security Response Services

    Sponsored by: ServiceNow

    Explore this case study to gain insight into how Freedom Security Alliance (FSA) improved their cybersecurity strategy by accelerating security response services.

  • Governance, Risk, and Compliance: The Business and IT Challenge

    Sponsored by: ServiceNow

    Open this resource to reveal, ServiceNow Governance, Risk, and Compliance (GRC) unified platform, so you can effectively respond to security risks in real-time through continuous monitoring, prioritization and automation.

  • Vulnerability and Threat Trends Report 2018

    Sponsored by: Skybox Security

    This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.

  • Global De-Duplication for Encrypted Data

    Sponsored by: Carbonite

    Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.

  • Active Directory Management and Security

    Sponsored by: One Identity

    Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.

  • Inside Commvault's Holistic Data Protection Center

    Sponsored by: Commvault

    Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.

  • 2018 Endpoint Security Survey

    Sponsored by: Tanium

    According to the 2018 PwC Global State of Information Security Survey, many companies vulnerable to cyberattacks remain unprepared to deal with digital intrusions. Explore this endpoint security survey to uncover what organizations think about the challenges of incident response, investigation and remediation on endpoints.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • How to Improve SIEM Systems with Machine Learning

    Sponsored by: LogRhythm, Inc.

    In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.

  • Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.

    Sponsored by: Juniper Networks

    Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Unlock Business Opportunity without Taking Security Risks

    Sponsored by: Juniper Networks

    This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.

  • The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.

  • The Evolution of RBAC Models to Next-Generation ABAC

    Sponsored by: Axiomatics

    In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.

  • The Rise of Machine Learning in Cybersecurity

    Sponsored by: CrowdStrike

    Today, the latest trend in cybersecurity is artificial intelligence, and specifically machine learning (ML). In this 31-page e-book, gain a detailed definition of ML and how you can successfully apply it to your security initiatives like malware detection.

  • Protect High-Value Assets From Internal Security Risks

    Sponsored by: Hewlett Packard Enterprise

    Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.

  • Future-Proof Your Tactical IAM Projects

    Sponsored by: One Identity

    This e-book provides insight into how to overcome barriers to identity and access management (IAM) success by future-proofing your tactical IAM projects.

  • 6 Steps to Build a Holistic Security Strategy with Microsoft 365

    Sponsored by: Microsoft

    This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.

  • UEBA Use Case: Insider Attack Identification

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.

  • Compromised User and Host Detection Using Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.

  • Holistic Endpoint Security

    Sponsored by: Cylance

    According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.

  • Case Study: Growing Regional Bank Preempts Potential Cyber Attackers

    Sponsored by: Illusive Networks

    How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.