56 Results for:Security Tools

  • Filter by: 

E-Guide: How to build a toolset to avoid Web 2.0 security issues

sponsored by SearchSecurity.com Published: 17 Sep 2010 eGuide

Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other ...

View Now

CW buyer's guide: context-aware security

sponsored by ComputerWeekly.com Published: 29 Apr 2013 Essential Guide

This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.

View Now

2012 Security Outlook

sponsored by ComputerWeekly.com Published: 24 Feb 2012 Essential Guide

This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

View Now

eGuide: Information Security - Buyer's Guide to Messaging Security

sponsored by SearchSecurity.com Published: 20 Nov 2009 eGuide

Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on ...

View Now

CW ASEAN: Trend Watch – Security

sponsored by ComputerWeekly.com Published: 18 Jul 2019 Ezine

Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber ...

View Now

Blue Prism Transforms Security from Reactive to Proactive with Veracode

sponsored by Veracode, Inc. Published: 20 May 2019 Case Study

Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a ...

View Now

Securing Applications in the Cloud

sponsored by Cloudflare Published: 18 Jan 2019 White Paper

In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and ...

View Now

Mobile security moving to a unified approach

sponsored by ComputerWeekly.com Published: 28 Feb 2018 eGuide

This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which ...

View Now

A Computer Weekly buyer's guide to Threat Management

sponsored by ComputerWeekly.com Published: 05 Apr 2019 eGuide

Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's ...

View Now

11 Limitations of Network-Centric Security In The Cloud

sponsored by Lacework Published: 24 Sep 2018 Resource

Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report ...

View Now