Research Library

Powered by

All Research

  • The Secure Third Party App Buyer's Guide

    Sponsored by: Veracode, Inc.

    In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.

  • DDoS Response Playbook

    Sponsored by: Imperva

    This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.

  • The 3 Third Party Software Security Controls

    Sponsored by: Veracode, Inc.

    In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.

  • The Four Key Elements of Fraud Prevention

    Sponsored by: IBM

    This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.

  • Case Study: App Code Security from the Ground Up

    Sponsored by: Veracode, Inc.

    View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.

  • Report Authoring with IBM Cognos Business Intelligence

    Sponsored by: IBM

    This white paper explores how new technology is extending the boundaries of traditional reporting, providing professional authors with unprecedented ways to view and communicate business performance and address the challenges of report authoring.

  • The Latest Trends Surrounding Collaboration in the Workplace

    Sponsored by: Premiere Conferencing

    Access this white paper that highlights trends and technologies that are powering business collaboration in 2015.

  • Top tips - Testing updates for virtual desktops

    Sponsored by: Unisys

    Access this exclusive e-guide to see how much testing should be done in order to help ensure employee productivity. Find out tips on golden image updates and discover the difference between testing updates for dedicated desktops and floating desktops.

  • CW Europe – March 2015

    Sponsored by:

    This issue of CW Europe explores how Neelie Kroes, who became the Netherlands Special Envoy for Startups at the beginning of 2015, is embarking on a new mission for startups in the Netherlands and the work she is leading via Startup Delta.

  • Supply chain Integration Strategy - What’s best for Your business

    Sponsored by: GT Nexus

    Explore this expert e-guide to learn more about supply chain integration, and gain insight into which strategy would be best for your business.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.