SearchSecurity.co.UK Research Library

Powered by Bitpipe.com

All Research

  • Baffled by managing digital identity?

    Sponsored by: ComputerWeekly.com

    Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.

  • Learn everything you need to know about Business Tablets & their effect on the industry

    Sponsored by: ComputerWeekly.com

    Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.

  • Are you using the right tablet device?

    Sponsored by: ComputerWeekly.com

    Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.

  • Building momentum: Symantec's new approach to security

    Sponsored by: TechTarget

    Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.

  • Building momentum: Symantec's new approach to security

    Sponsored by: TechTarget

    Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.

  • IT in Europe: Taking control of smartphones: Are MDMs up to the task?

    Sponsored by: SearchSecurity.com

    In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.

  • E-Guide: Identifying and addressing evolving threats

    Sponsored by: SearchSecurity.com

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

  • IT in Europe: Security in the Cloud

    Sponsored by: SearchSecurity.com

    Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    Sponsored by: SearchSecurity.com

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

  • E-Guide: Uniting SIM and IAM to Boost Security

    Sponsored by: SearchSecurity.com

    When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.

About the SearchSecurity.co.UK Research Library

The Information Security Research Library provides information technology (IT) professionals with the latest research on application security, data protection, regulatory compliance, identity and access management, network security and more, with the latest vendor and analyst white papers, case studies, webcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

SearchSecurity.co.UK Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.