Research Library

Powered by

Security Best Practices Research

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Endpoint Security vs Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.

  • Comparative Analysis of Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damaged they've done and what tools they've used to accomplish their malicious objectives.

  • Compliance at Velocity

    Sponsored by: Chef Software

    Discover why compliance at velocity is not only a possibility, but a reality. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.

  • Security & Management for your Mobile Data

    Sponsored by: Wandera

    Discover how to gain a multi-level security architecture, both on device and in the cloud, working in real-time to provide insights into your mobile data that goes beyond MDM.

  • Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

    Sponsored by: A10 Networks

    Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim.

  • The Business Value of Printer Security

    Sponsored by: HP

    This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more.

  • 2016 Mobile Security & Business Transformation Study

    Sponsored by: IBM

    Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Barracuda NextGen Firewall Advanced Threat Detection

    Sponsored by: Barracuda Networks

    Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.

  • Your Guide to Business Email Compromise

    Sponsored by: Agari

    Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.

  • Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

    Sponsored by: Barracuda Networks

    Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training.

  • Your Guide to Fraudulent Invoice Email

    Sponsored by: Agari

    In this webcast, learn how to combat targeted attacks, spear-phishing, and malicious emails dressed up to look and sound legitimate.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Trustwave Secure Web Gateway Cloud for the Financial Industry

    Sponsored by: Trustwave

    Discover how to get superior protection, control and visibility from your cloud security platform. Allow security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.

  • Uncovering the True Costs of Enterprise Mobility

    Sponsored by: Wandera

    This report explores the essential findings of a TCO analysis in 5 key areas of cost, including hardware, IT resources, security, and 2 more. Access now to find out how to take a more holistic approach to calculating the TCO for enterprise mobility and defending against the associated security risks.

  • Why You Need to Test All Your Cloud, Mobile and Web Applications

    Sponsored by: Trustwave

    This white paper addresses the importance of complete application testing and gives you recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.

  • Is Your Data Secure?

    Sponsored by: Commvault

    Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.

  • Stop Malware Before It Stops You

    Sponsored by: Trustwave

    Detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.

  • Enterprise Apps OWASP Mobile Security Risks Report

    Sponsored by: Wandera

    This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.

  • Best-of-Breed Next-Generation Security For the Mid-Market

    Sponsored by: Barracuda Networks

    Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.