Research Library

Powered by

Risk Management Research

  • Why Email Security Matters: The Advantages of Hosted Protection

    Sponsored by: LogicNow

    Discover the key advantages of hosted email protection. Read on to discover this method's detailed protection mechanisms, which include blacklisting, anti-spam engines that look for telltale signatures, and real-time message source evaluation.

  • Security Intelligence Services for Advanced Threat Detection and Resolution

    Sponsored by: Kaspersky Lab

    This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they can have a negative impact on your organization.

  • Closing the Circle of Network Defense with Threat Intelligence

    Sponsored by: Kaspersky Lab

    This white paper explores how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.

  • IT Security 101: Thinking Like a Cybercriminal?

    Sponsored by: LogicNow

    Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.

  • Building a Security Fabric for Today's Network

    Sponsored by: Fortinet, Inc.

    Your firewall technology must evolve as fast as your borderless enterprise. Discover how to reduce complexity while increasing security effectiveness. Learn how to consolidate network security technologies across your entire infrastructure to receive high levels of reliable network performance throughout your extended perimeter.

  • One Enterprise Firewall Solution to Protect Your Entire Network

    Sponsored by: Fortinet, Inc.

    Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. One platform, one network security operating system is all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.

  • The Eaton Power Management Guide

    Sponsored by: Eaton

    This white paper offers a five step guide to building a proper power management solution while optimizing your existing one. Engage in this intelligent power management strategy to fully reap the benefits of the existing modern IT architectures and avoid unforeseen risks.

  • Security for Virtualization

    Sponsored by: Kaspersky Lab

    Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. This product overview highlights a complete, security tool designed for virtualization platform technologies that barely impacts performance.

  • Intelligence Reporting: Answers to Your Security Questions

    Sponsored by: Kaspersky Lab

    This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.

  • Information Security Reference Guide

    Sponsored by: Navex Global

    This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Based on ISO and the International Electrotechnical Commission (EC) standards, it lays out a definite structure for information security, access control and compliance among many other critical areas.

  • Transformative Technology in Document Security

    Sponsored by: HP

    This IDC Insight reviews how 3rd platform technologies such as mobile, cloud, and big data play a role in technology suppliers expanding their print security service offerings.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • Endpoint Security vs. Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • How to Enhance Your Web Security with the Cloud

    Sponsored by: Trustwave

    Discover how to enhance your web protection, control and visibility from a cloud security platform. Uncover the benefits of allowing security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • Managed Security Services Provider – Evaluation Checklist

    Sponsored by: Trustwave

    Evaluate your next MSSP with this simple to use checklist. With it, you'll know important questions ask during the decision process and be able to compare two potential MSSP's against each other quickly and easily.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.