Research Library

Powered by

Security Management Research

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.

  • Security & Management for your Mobile Data

    Sponsored by: Wandera

    Discover how to gain a multi-level security architecture, both on device and in the cloud, working in real-time to provide insights into your mobile data that goes beyond MDM.

  • Mobile Security: Gain Real-Time Threat Prevention

    Sponsored by: Wandera

    Learn how to gain real-time threat prevention, compliance and data cost management for mobile devices. Discover how to block threats such as data leaks, malware, and man-in-the-middle attacks, responding with real-time policy enforcement.

  • The CASB Challenge: APIs or Proxies?

    Sponsored by: Palerra Inc.

    Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.

  • Top Phishing Attacks: Discovery and Prevention

    Sponsored by: Agari

    Learn the behaviors of, and remedies for, phishing attacks that are targeting enterprises in ever increasing numbers.

  • Put Endpoint Security in Capable Hands

    Sponsored by:

    Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.

  • Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

    Sponsored by: A10 Networks

    Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Provide the Ideal Frontline Firewall Defense

    Sponsored by: Barracuda Networks

    Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.

  • Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • 2016 Mobile Security & Business Transformation Study

    Sponsored by: IBM

    Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.

  • 10 Critical Requirements for Optimizing Application Delivery

    Sponsored by: A10 Networks

    Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.

  • Fragmentation: The "Silent Killer" of Your Security Management Program

    Sponsored by: ThreatConnect

    This paper looks at the issues caused by security fragmentation and lays out a path towards better security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.

  • Barracuda NextGen Firewall Advanced Threat Detection

    Sponsored by: Barracuda Networks

    Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.

  • Your Guide to Business Email Compromise

    Sponsored by: Agari

    Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.

  • Your Guide to Fraudulent Invoice Email

    Sponsored by: Agari

    In this webcast, learn how to combat targeted attacks, spear-phishing, and malicious emails dressed up to look and sound legitimate.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Protecting and Empowering your Connected Organization

    Sponsored by: Microsoft

    This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.

  • Uncovering the True Costs of Enterprise Mobility

    Sponsored by: Wandera

    This report explores the essential findings of a TCO analysis in 5 key areas of cost, including hardware, IT resources, security, and 2 more. Access now to find out how to take a more holistic approach to calculating the TCO for enterprise mobility and defending against the associated security risks.

  • Is Your Data Secure?

    Sponsored by: Commvault

    Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.