Security News White Papers

CW Nordics ezine February 2018

Security News White Papers - Thu, 03/01/2018 - 12:00am
In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs. Published by: ComputerWeekly.com

Mobile security trends point to unifying policy and tools

Security News White Papers - Tue, 02/27/2018 - 12:00am
Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management. Published by: SearchSecurity.com

Disaster recovery in the age of cloud

Security News White Papers - Tue, 02/27/2018 - 12:00am
The cloud is emerging as a key option for disaster recovery. Its benefits include reduced costs and taking advantage of the provider's skills when you may not have them in-house. But when is it best to go cloud for DR? That's one of the key decision points we address in this e-guide. Published by: ComputerWeekly.com

ASEAN IT Priorities 2018

Security News White Papers - Mon, 02/26/2018 - 12:00am
This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure. Published by: ComputerWeekly.com

Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Security News White Papers - Fri, 02/23/2018 - 12:00am
In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by: ComputerWeekly.com

ANZ IT Priorities 2018

Security News White Papers - Fri, 02/23/2018 - 12:00am
The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well Published by: ComputerWeekly.com

Protecting Your Sensitive Data

Security News White Papers - Wed, 02/21/2018 - 12:00am
Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud. Published by: Symantec

The Future of Privileged Management

Security News White Papers - Wed, 02/21/2018 - 12:00am
The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn about where privileged management is heading and uncover an approach to securing privileged accounts. Published by: One Identity

Regulating Privileged Access: When to Require Human Approval Workflows

Security News White Papers - Wed, 02/21/2018 - 12:00am
Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity Published by: One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

Security News White Papers - Wed, 02/21/2018 - 12:00am
In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights. Published by: One Identity

Identity Analytics – A more Collective Defense

Security News White Papers - Wed, 02/21/2018 - 12:00am
As technology evolves, managing access is especially difficult when dealing with users, groups, computers, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program. Published by: One Identity

Crafting a Cybersecurity Incident Response Plan, Step by Step

Security News White Papers - Tue, 02/20/2018 - 12:00am
Is your cybersecurity incident response plan the best it can be? Explore this security handbook to uncover step by step instructions to crafting an effective incident response plan for your organization. Published by: SearchSecurity.com

Forcepoint CASB: Visibility and Control of Cloud Applications

Security News White Papers - Mon, 02/19/2018 - 12:33am
Watch this webcast to learn about the 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they provide. Finally, discover a vendor who may be able to provide you the data governance, audit protection, and more you need. Published by: Forcepoint

Protect Against Zero Day Threats and Malware

Security News White Papers - Mon, 02/19/2018 - 12:01am
Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing. Published by: Citrix

How to Maintain Control of Documents and Files Shared with Others

Security News White Papers - Mon, 02/19/2018 - 12:00am
Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more. Published by: Citrix

Computer Weekly – 13 February 2018: On the path to diversity in tech

Security News White Papers - Fri, 02/16/2018 - 12:00am
In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now. Published by: ComputerWeekly.com

CW ASEAN – February 2018: European data law: be aware and prepare

Security News White Papers - Thu, 02/15/2018 - 12:00am
Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses. Published by: ComputerWeekly.com

CW ANZ – February 2018: Prepare for EU data law

Security News White Papers - Thu, 02/15/2018 - 12:00am
Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws. Published by: ComputerWeekly.com

The next wave of IoT in Asia: What to expect in 2018

Security News White Papers - Thu, 02/15/2018 - 12:00am
In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions. Published by: ComputerWeekly.com

User Behavior Analysis & SIEM

Security News White Papers - Wed, 02/14/2018 - 12:00am
In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis. Published by: LogRhythm, Inc.

Pages