Research Library

Powered by

Data Security Research

  • What is Endpoint Security? What Benefits Does it Offer?

    Sponsored by: CrowdStrike

    This expert e-guide discusses approaches to secure every endpoint in your organization. Download now to learn about endpoint protection software and explore nine capabilities most often provided by this software.

  • Why IT Professionals Need to Take Responsibility for Data Security

    Sponsored by: Oracle Corporation

    This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.

  • The Database Security Imperative

    Sponsored by: Oracle Corporation

    In this brief video, Oracle CSO Mary Ann Davidson discusses common misconceptions about database security and gives advice for how to better prioritize your security strategy.

  • Caring for Mission Critical Printing

    Sponsored by: Nuance

    Read this case study to discover how one medical center adopted a more streamlined printing strategy that kept sensitive documents from falling into the wrong hands.

  • Special Report: Compromised Data in the Dark Web

    Sponsored by: SurfWatch Labs

    This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.

  • Citrix solutions for healthcare

    Sponsored by: Citrix

    Access this white paper to learn about a suite of solutions that help healthcare organizations embrace mobile workstyles and cloud services to improve both patient care and organizational performance.

  • Case Study: Health Insurer Innovates its Endpoint Security

    Sponsored by: CrowdStrike

    This brief video describes how a major healthcare provider updated its security with a next generation endpoint protection platform.

  • Remote access your users will love

    Sponsored by: Citrix

    Access this white paper to uncover the growing user challenges with remote access. Also, discover the key characteristics of a remote access solution strategy that gives users a remote experience they'll love while meeting IT's requirements for security and manageability.

  • Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones

    Sponsored by: Citrix

    Access this white paper to get an in-depth look at the major mobile OS platforms, the security issues and features unique to each, and the measures IT needs to take to maintain control while encouraging productivity and mobility.

  • Accel Takes MSP Automation to the Next Level

    Sponsored by: Solarwinds N-able

    This white paper details how one MSP was able to automate its processes and provide their clients with exceptional security and backup services. Read on to find out more about how this company was able to reduce the time of on-boarding tasks, increase operational efficiencies, and more.

  • Best practices to make BYOD simple and secure

    Sponsored by: Citrix

    Access this white paper to explore the features and best practices of a complete BYOD strategy. Also, uncover a line of complete BYOD solutions that address all the key capabilities required to make BYOD simple, secure, and effective for any organization.

  • Taking Advantage of the General Data Protection Regulation

    Sponsored by: Oracle Corporation

    This resource provides a breakdown all of the information you need to navigate the data security changes brought by the upcoming General Data Protection Regulation.

  • Introduction to Citrix Workspace Suite

    Sponsored by: Citrix

    Access this informative brochure to learn about a complete mobile workspace solution that allows IT to securely deliver all apps (Windows, web, SaaS, mobile), data, and services from any device, over any network.

  • 5 steps to introducing BYOD in your organization

    Sponsored by: Citrix

    Access this informative white paper to explore technologies designed to optimize your BYOD deployment and learn five simple steps to plan and roll out a BYOD initiative in your organization.

  • An Examination of Web App Security Process Management

    Sponsored by: WhiteHat Security

    In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.

  • 3 Strategies to Manage Compliance Mandates

    Sponsored by: Citrix

    This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.

  • Cyber Attack Survival Checklist

    Sponsored by: CrowdStrike

    This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.

  • Today's State of Mobile App Security

    Sponsored by: IBM

    Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.

  • FlexCast technology powers workforce mobility

    Sponsored by: Citrix

    Check out this white paper to discover how FlexCast virtualization technology can help IT departments meet all of their virtualization goals, from enabling BYOD to transforming call centers.

  • Securing Information in the New Digital Economy

    Sponsored by: Oracle Corporation

    This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.

  • Empowering Information Security with Desktop Virtualization

    Sponsored by: Citrix

    This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.

  • Virtual Server Protection: A Buyer's Checklist

    Sponsored by: Commvault

    In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.

  • From BlackBerry to BYOD, CYOD or COPE

    Sponsored by: Citrix

    Access this white paper to learn about the security, management, and application delivery features of Blackberry, Apple iOS and Google Android devices. Also, discover a comprehensive enterprise mobility management (EMM) and mobile device management (MDM) platform for BYOD initiatives.

  • Responding to Unpopular HIPAA Disclosure Requirements

    Sponsored by: Absolute

    In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.

  • 10 Vital Questions for Evaluating Your Mobile Security Strategy

    Sponsored by: Citrix

    Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.