Research Library

Powered by

Risk Assessment Research

  • Achieve Business Continuity with Secure and Reliable Unified Communications

    Sponsored by: ThinkingPhones

    This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into the following advice for achieving long-term security and stability with UC.

  • Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements

    Sponsored by: IBM

    This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.

  • Build Confidence in Your Resiliency Program Through Functional Validation

    Sponsored by: IBM

    This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.

  • Software-Defined Data Center Meets Micro-Segmentation

    Sponsored by: VMware

    This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.

  • Maximize ROI by Deploying Strategic Partners in UC&C

    Sponsored by: Polycom, Inc.

    In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.

  • Addressing Liquidity and Solvency Risk

    Sponsored by: IBM

    In this white paper, learn more about how different industries are responding to these changes. This survey unlocks some of the key differences in the industry, and what that could mean for your business.

  • A Simple Guide to Successful Penetration Testing

    Sponsored by: Core Security Technologies

    This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.

  • Managing Threats and Remediating Risk for State of Vermont Applications

    Sponsored by: Core Security Technologies

    In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.

  • Extracting More Value from SIEM Deployment

    Sponsored by: Splunk

    This white paper demonstrates how to you leverage all your machine-generated data for broader views across possible attack vectors. Read on to key into the solutions behind bolstering against potential threats.

  • Advanced Threat Detection and Response

    Sponsored by: Splunk

    This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.

  • Best Practices for Threat & Vulnerability Management

    Sponsored by: Core Security Technologies

    This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.

  • A SANS Survey: How Does Your Security Stack Up?

    Sponsored by: LogRhythm, Inc.

    Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.

  • Build Security that's Proactive, Not Reactive

    Sponsored by: CrowdStrike

    This white paper discusses the importance of proactive security and how you can build that kind of security in your environment.

  • From Project to Product

    Sponsored by: Red Hat

    Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.

  • 4 Secrets to Security: Engaging a Meaningful Dialogue

    Sponsored by: Citrix

    Security is of greater interest to corporate boards than ever before and an effective security strategy is crucial. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.

  • Strategic Migration Planning Guide: WebSPHERE to JBoss Enterprise Application Platform

    Sponsored by: Red Hat

    This migration planning guide provides a five-step process designed to identify migration opportunities, examine risks, create a standard enterprise environment, and develop a strategic migration plan. Read now for insight into the considerations and processes required to move to an enterprise app platform.

  • Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More

    Sponsored by: Gartner

    Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.

  • 2015 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.

  • Raising Your Google Ranking: A Guide

    Sponsored by: Symantec Corporation

    To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.

  • Bolster Your Web Application Security

    Sponsored by: WhiteHat Security

    This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.

  • Don’t Let Your DDoS Defense Fall Behind

    Sponsored by: Neustar®

    This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.

  • Securing the Mobile-First Experience

    Sponsored by: HID

    This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.

  • Uncover Advanced Attacks and Detect Hidden Breaches

    Sponsored by: Hewlett-Packard Limited

    In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.

  • Simplifying Protection of Critical Assets

    Sponsored by: AVG Technologies

    This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.

  • The Cloud at Your Pace

    Sponsored by: Rackspace

    Access this white paper for the 8 top cloud concerns and learn how you can address them, while minimizing your risks, and moving to the cloud at your own pace.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.