Research Library

Powered by

Risk Management Research

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Windows 10: If Compatibility is Not a Problem, What Is?

    Sponsored by: Flexera Software

    Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.

  • 25 Simple Yet Overlooked Ways to Boost Your Ethics & Compliance Program

    Sponsored by: Navex Global

    Access this e-book to uncover a 25-step guide to boosting your compliance and ethics program by improving culture, getting better connected with employees and boosting program awareness.

  • Fighting Against Authorized Push Payment (APP) Scams

    Sponsored by: HID Global

    This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.

  • Staying Secure is All About Keeping One Step Ahead

    Sponsored by: BT

    With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.

  • Securing the Digital Enterprise

    Sponsored by: BT

    Cybersecurity dominates the media and the chances of a business or an individual becoming a victim have never been greater. This white paper provides a practical guide to organizations on their journey to using security as a business enabler as well as offering useful checklists for those who are already on their journey to protection.

  • Buyer's Guide: Cybersecurity

    Sponsored by: Palo Alto Networks

    Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.

  • DDoS Overview: Keeping the Web Open for Business

    Sponsored by: BT

    41% of global organizations surveyed by BT experienced a DDoS attack last year, with 78% hit more than once. Watch this DDoS attack overview webcast to gain insight into the basics of DDoS attacks and how you can protect your organization with the best protection strategy for your needs.

  • Secure Communications for a Safer World

    Sponsored by: BT

    This case study provides a concrete example of how network security within UK government departments was enhanced with a secure communications strategy. Discover how this approach made processes more agile and efficient, while meeting the most stringent security requirements.

  • DDoS Trends Report

    Sponsored by: Corero Network Security

    In Q3 of 2017, Corero customers experienced an average of 237 DDoS attacks per month, which is an increase of 35% compared to Q2. This DDoS Attack Trends Report offers DDoS statistics, patterns, attack types, and key insights in order to help you protect your enterprise against these sophisticated attacks.

  • Turning DDOS from a Cost Center to a Revenue Generator

    Sponsored by: Corero Network Security

    According to IDC, worldwide spending on DDoS protection will reach over $1 billion by 2019. In this e-book, learn how to protect your organization from DDoS attacks, in addition to understanding how to gain a revenue opportunity.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • Smart Prevention: Expect the Unexpected

    Sponsored by: BT

    As attackers become increasingly creative, reaching corporate resources with ever-more complex attacks, enterprises are drowning in detected and undetected issues. This white paper provides insight into preventing security threats proactively, rather than reacting once you have already been attacked.

  • Achieve Security and Compliance in the Cloud Without Breaking the Bank

    Sponsored by: Alert Logic

    Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.

  • How to Handle a Ransom Driven DDoS Attack

    Sponsored by: Corero Network Security

    Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.

  • Compliance: Unlocking the Data that Matters

    Sponsored by: BT

    Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.

  • Data + Security = A Most Unvirtuous Relationship

    Sponsored by: Delphix

    Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.

  • The Evolving Risk Landscape

    Sponsored by: F5 Networks

    There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

  • How Malware Can Steal Your Data

    Sponsored by: F5 Networks

    51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.

  • Top Cyber Threats to the Technology Sector

    Sponsored by: Digital Shadows

    Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.

  • GDPR Quick Start Guide

    Sponsored by: MarkLogic

    According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.

  • Top Cyber Threats to The Retail Sector

    Sponsored by: Digital Shadows

    Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.

  • ROI Analysis: IBM BigFix Patch And BigFix Compliance

    Sponsored by: IBM

    This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How can organizations get control over privileged identity management?

    Sponsored by: One Identity

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.