Research Library

Powered by

Risk Management Research

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • 5 Ways to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.

  • Threat Analytics Module: Gain Visibility Into Malicious User Activity

    Sponsored by: LogRhythm, Inc.

    User accounts have long been one of the most prevalent attack vectors for advanced attacks and data breaches. This product overview highlights a threat analytics module that can secure your organization with immediate visibility into suspicious or malicious user activity indicative of an attack.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Barracuda Networks

    Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.

  • Why NGFWs Are Becoming the New Standard in Enterprise Security

    Sponsored by: Fortinet, Inc.

    The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.

  • Managing Content Beyond the Corporate Walls: Working in the Cloud

    Sponsored by: ASG

    If your organization doesn't provide employees with proper content management, they'll make up their own, putting security and compliance at risk. Access this white paper to learn how to manage your organization's content beyond your firewalls and corporate structure, and why the path to success is through the cloud.

  • 2016 State of the Channel Ransomware Report

    Sponsored by: Datto

    93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.

  • Ransomware Made MSPeasy

    Sponsored by: Datto

    In the first 3 months of 2016, companies lost $200 million to ransomware. Learn about today's leading ransomware threats and how to educate your customers on the importance of investing in security, backup and recovery solutions.

  • The Endpoint Security Guide to Preventing Ransomware Attacks

    Sponsored by: Carbon Black

    This e-book answers questions like "What is ransomware?" and "How does it work?" to help you learn how to defend your business. Explore how new and advanced ransomware like Locky operate and review case studies from companies that have successfully stopped attacks so that you can start preparing your organization.

  • Log Management and Automation for NIST Cyber Security Framework

    Sponsored by: LogRhythm, Inc.

    This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.

  • Is Your Security Ops Strategy Ready for the Cloud?

    Sponsored by: Alert Logic

    In this presentation form Forrester, evaluate the impacts that cloud adoption has had on cloud security operations and the related challenges and benefits that IT professionals experience from this.

  • SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You

    Sponsored by: ThreatConnect

    Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.

  • The Last Line of Defense Against the “Mega Breach”

    Sponsored by: CrowdStrike

    The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • Why Move to an MSSP?

    Sponsored by: Trustwave

    Learn about the most common reasons for moving IT security functions to a hybrid or fully managed security services provider (MSSP) model. Discover the unique methods that an MSSP offers in overcoming several common security challenges ranging from tactical to strategic.

  • Meet the Need for Regulatory Risk Management

    Sponsored by: IntraLinks, Inc

    Discover how to securely exchange data and documents across organizations while keeping within ever changing regulatory requirements. Learn how to centralize work papers for easy access and streamline enterprise risk assessments to quickly improve your security posture.

  • Security Testing Practices and Priorities

    Sponsored by: Trustwave

    This report shows the survey results from Osterman Research about security testing within various organizations. Discover which security issues organizations had experienced most frequently within the past year and how vulnerable many of these organizations were.

  • Security Health Check Report: Data & Breaches

    Sponsored by: Trustwave

    This report gives you perspectives from both technical and non-technical professionals in the healthcare industry to help you better understand the current state of healthcare security. Learn how to prioritize your most pressing data security issues and take action to prevent future breaches.

  • Retail Tip Sheet

    Sponsored by: Trustwave

    It's easy to assume your organization won't fall victim if you've check off all compliance requirements. But hackers are always evolving their methods to get what you don't want them to have. Discover 10 practices you can enact to avoid costly data breaches.

  • Governance, Risk and Compliance for the Real World: Understanding GRC

    Sponsored by: Dell Software

    Explore key obstacles to an IT GRC program, and learn what organizations can do to automate operational controls for IT infrastructure. Discover common frameworks and requirements designed to help you adhere to regulations and mandates.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

  • 4 Ways Neustar Strengthens your DNS Security

    Sponsored by: Neustar

    The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.