Research Library

Powered by

Risk Management Research

  • Develop a strong IAM strategy for third-party vendors

    Sponsored by: Radiant Logic, Inc.

    This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.

  • Advanced Zero Day Protection with APT Blocker

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper shows you four key characteristics your detection software must have to adequately secure your organization. Access now to go beyond simple signatuer-based antivirus detection and gain a cloud-based sandbox with full system emulation to detect the most advanced threats.

  • Buyer's Guide: Network Monitoring Tools

    Sponsored by: TechTarget

    In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Seize The Data: Reduce your risk

    Sponsored by: Hewlett-Packard Enterprise

    Learn how one healthcare provider was able to identify, investigate and resolve security issues before they became an issue. Download now to discover what software helped them along the way.

  • Business Continuity, Disaster Recovery Plan Best Practices

    Sponsored by: Cirrity

    This brief e-guide highlights best practices for implementing a successful disaster recovery (DR) and business continuity (BC) plan. Discover Andre Gold's, head of IT operations and security for, tips for DR planning and learn from security expert Mike Rothman about the differences between BC planning and operational risk management.

  • Buyer’s Guide to Enterprise Collaboration Solutions

    Sponsored by: IntraLinks, Inc

    This white paper will help you collaborate with potential security providers and vendors when performing due diligence in choosing your right solution. Access now to learn how you can get end-to-end visibility as your data travels through complex networks.

  • Meaningful Measurement

    Sponsored by: LogicNow

    This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.

  • CIS Critical Security Controls - Accelerated & Simplified

    Sponsored by: AlienVault

    The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.

  • IDS Evaluation Guide

    Sponsored by: AlienVault

    This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.

  • Your Legal Liability Following a Cybersecurity Breach

    Sponsored by: SurfWatch Labs

    This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.

  • ICS Survey

    Sponsored by: SurfWatch Labs

    This white paper shows the security survey results taken by 314 industry respondents. Access now to learn about organizational breach concerns and how businesses have responded to recent threats.

  • How to Secure Health Records on the Screen

    Sponsored by: OptioLabs

    This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.

  • How to Choose the Right Cyber Threat Intelligence Provider

    Sponsored by: SurfWatch Labs

    This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.

  • Protect Your Computer Screen With OptioLabs' OptioAware

    Sponsored by: OptioLabs

    In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.

  • Defending against POS Malware

    Sponsored by: AlienVault

    This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.

  • Tackle IAM Issues with Risk-Based Identity Governance

    Sponsored by: Hitachi ID Systems, Inc.

    Today, the key to securing the enterprise rests in an alternative IAM approach. IAM experts Warwick Ashford and Michele Chubirka present the benefits of risk-based IAM and using identity governance to secure applications and users.

  • Provide a Unified, Coherent Developer Experience using Cloud-based Identification

    Sponsored by: Radiant Logic, Inc.

    This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.

  • Cyber Risk Report - Year in Review

    Sponsored by: SurfWatch Labs

    This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.

  • The Human Factor Report

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

  • Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction

    Sponsored by: OptioLabs

    This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.

  • The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain

    Sponsored by: Dell SecureWorks

    This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.

  • Securing the Enterprise - 5 Pragmatic Steps to Security

    Sponsored by: Dell SecureWorks

    This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.

  • Growing Security Concerns Across Industries

    Sponsored by: Dell, Inc.

    This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.

  • Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020

    Sponsored by: Carbon Black

    This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.