Research Library

Powered by

Risk Assessment Research

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Comparative Analysis of Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damaged they've done and what tools they've used to accomplish their malicious objectives.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Trustwave Secure Web Gateway Cloud for the Financial Industry

    Sponsored by: Trustwave

    Discover how to get superior protection, control and visibility from your cloud security platform. Allow security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.

  • 6 Things to Consider While Choosing an ERP Software

    Sponsored by: Deskera

    The enterprise resource planning (ERP) software market is in flux, so it's more important than ever to understand exactly which business needs a software is going to meet before you commit. Read on to uncover the top 6 considerations before you dive into the choppy waters of the ERP software market.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • Managed Security Services Provider – Evaluation Checklist

    Sponsored by: Trustwave

    Evaluate your next MSSP with this simple to use checklist. With it, you'll know important questions ask during the decision process and be able to compare two potential MSSP's against each other quickly and easily.

  • Global DDoS Threat Landscape Report

    Sponsored by: Imperva

    This white paper highlights DDoS attack duration and frequency data of attacks. It examines trends in both network and application layer DDoS attacks and helps you assess potential damage to your organization if a DDoS attack hit.

  • DDoS Response Playbook

    Sponsored by: Imperva

    Discover how to plan for and execute a DDoS response plan. Learn pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.

  • Ransomware and Phishing: How to Avoid Falling Victim to These Threats

    Sponsored by: Barracuda Networks

    Discover how to gain complete visibility, control and protection against malware, spyware, phishing, spear phishing and ransomware threats. Learn how to adequately secure all of your threat vectors and proactively stay ahead of the latest threats with an intelligent backend infrastructure.

  • The Biggest Cyber Threat Facing Businesses Today

    Sponsored by: Agari

    Business email compromise (BEC) scams are by no means a new phenomenon. But as these scams become more sophisticated, it becomes even more important to stay up to date with the latest types of attacks to evolve out of BEC. Discover a proactive approach to risk management that will help protect your business against these advanced phishing attacks.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • Case Study: Technology Manufacturer Stops TeslaCrypt Attack

    Sponsored by: Carbon Black

    Download this case study to learn how to unravel, remediate, and moreover protect against all endpoint attacks (such as TeslaCrypt ransomware). Implement complete endpoint visibility with a proactive response platform that can reduce your number of breaches to zero.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • 5 Ways to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.

  • Threat Analytics Module: Gain Visibility Into Malicious User Activity

    Sponsored by: LogRhythm, Inc.

    User accounts have long been one of the most prevalent attack vectors for advanced attacks and data breaches. This product overview highlights a threat analytics module that can secure your organization with immediate visibility into suspicious or malicious user activity indicative of an attack.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Barracuda Networks

    Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.

  • Why NGFWs Are Becoming the New Standard in Enterprise Security

    Sponsored by: Fortinet, Inc.

    The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.

  • 2016 State of the Channel Ransomware Report

    Sponsored by: Datto

    93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.