SearchSecurity.co.UK Research Library

Powered by Bitpipe.com

All Research

  • Building momentum: Symantec's new approach to security

    Sponsored by: TechTarget

    Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.

  • Building momentum: Symantec's new approach to security

    Sponsored by: TechTarget

    Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.

  • IT in Europe: Taking control of smartphones: Are MDMs up to the task?

    Sponsored by: SearchSecurity.com

    In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.

  • E-Guide: Identifying and addressing evolving threats

    Sponsored by: SearchSecurity.com

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

  • IT in Europe: Security in the Cloud

    Sponsored by: SearchSecurity.com

    Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    Sponsored by: SearchSecurity.com

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

  • E-Guide: Uniting SIM and IAM to Boost Security

    Sponsored by: SearchSecurity.com

    When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.

About the SearchSecurity.co.UK Research Library

The Information Security Research Library provides information technology (IT) professionals with the latest research on application security, data protection, regulatory compliance, identity and access management, network security and more, with the latest vendor and analyst white papers, case studies, webcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

SearchSecurity.co.UK Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.