WhatIs.com Research Library

Powered by Bitpipe.com

Internet SecurityResearch

  • Secure internet routing

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

  • Expert Guide to Secure Web Gateways

    Sponsored by: TechTarget

    Secure web gateways are becoming more prominent amongst many organizations, but understanding how to implement it into your infrastructure is imperative for optimal performance. Participate in this survey and gain access to this expert guide providing deeper insight into different feature options into how to circumvent deployment challenges.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Secure Web Gateways Decision Center

    Sponsored by: SearchSecurity.com

    This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

  • SearchSecurity.com University: Why SSL Certificate Security Matters

    Sponsored by: SearchSecurity.com

    In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.

  • How To Secure Online Activities

    Sponsored by: Global Knowledge

    The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.

  • 802.1x - Implementing and Deploying Methods

    Sponsored by: Global Knowledge

    You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • The Dynamic DNS Infrastructure

    Sponsored by: F5 Networks

    This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing.

  • The Tangled Web of Data Privacy Issues

    Sponsored by: Thawte Inc.

    In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.

  • How Can You Avoid a Web Security Breach? It's All in the Preparation

    Sponsored by: Thawte Inc.

    In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Sponsored by: Symantec Corporation

    Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

  • SSL Certificate Management: Avoiding Common Mistakes

    Sponsored by: Symantec Corporation

    This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.

  • Website Security Threat Report, Part Two

    Sponsored by: Symantec Corporation

    This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.

  • September CIO Decisions Ezine: Architecting a Nimble Enterprise

    Sponsored by: SearchCIO.com

    Agile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • The New Phishing Attack: How to Avoid Taking the Bait

    Sponsored by: Websense

    Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.

  • Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • Web Browser Security Features Make Attacks Harder

    Sponsored by: GeoTrust, Inc.

    This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.

  • Managing Web Security in an Increasing Challenging Threat Landscape

    Sponsored by: Webroot

    This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.

  • Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company

    Sponsored by: Webroot

    This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • Server-Gated Cryptography: Providing Better Security for More Users

    Sponsored by: Thawte Inc.

    Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

WhatIs.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.