Research Library

Powered by

All Research

  • A Terrorists Utilisation of the Internet

    Sponsored by:

    As the technological landscape continues to evolve, cyber-criminals and cyber-terrorists are utilsing the internet and web based tools to help carry out their attacks. In this essential guide, experts delve deeper into the current threat and its potential evolution. To learn more, simply participate in our brief Vulnerability Management Survey.

  • How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration

    Sponsored by: Cyber-Ark Software

    This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.

  • Get the most from the move to a next-generation firewall

    Sponsored by: McAfee, Inc.

    This white paper will help network and cybersecurity teams understand the things they can and should demand from next-generation firewalls.

  • Advanced Cyber Threats Demand a New Privileged Account Security Model

    Sponsored by: Cyber-Ark Software

    In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.

  • Rethinking Backup and Recovery in the Modern Data Center

    Sponsored by: HP Autonomy

    This white paper addresses why a new backup and recovery approach must touch 4 key elements – prioritization, prediction, recommendation, and automation – to achieve maximum resource efficiency. Read on to discover 3 important qualities your new backup and recovery approach must have to manage today's changing environments and big data challenges.

  • Key Considerations for Optimizing Server Virtualization

    Sponsored by: Hewlett-Packard Limited and Intel ®

    This expert e-guide will help you maximize the performance of your virtualized server environment.

  • Baffled by managing digital identity?

    Sponsored by:

    Download your exclusive edition of Computer Weekly Buyer's Guide to Managing Identity & Access to answer your questions regarding digital identity and the impact it has on your organisation. To access your complimentary guide please take our Identity and Access Management Survey. We look forward to hearing from you.

  • Network Management: In with the New, Out with the Old

    Sponsored by:

    Networking departments are in the midst of a technological revolution. Download Computer Weekly's Buyer's Guide to Networks to discover how a network virtualisation movement intends to replace proprietary hardware controls with virtualised software equivalents. Simply take our brief Network Management Survey to get immediate access to the guide.

  • Learn everything you need to know about Business Tablets & their effect on the industry

    Sponsored by:

    Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.

  • Advanced Evasion Techniques For Dummies

    Sponsored by: McAfee, Inc.

    In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.