Research Library

Powered by

Security Policies Research

  • What You Need To Know About Cyber Security Development

    Sponsored by: Hewlett-Packard Company

    This expert e-guide explores the 3 steps for performing a cybersecurity risk assessment and where to target your efforts. Access now to learn how to analyze risk data to build the foundation of your cybersecurity strategy.

  • Next-Gen DLP: Can It Protect Your Organization?

    Sponsored by: Clearswift

    This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.

  • Make Cybersecurity A Priority With Teamwork And Preparation

    Sponsored by: Hewlett-Packard Company

    This expert e-guide explores various strategies to effectively communicate the importance of cybersecurity to management. Also inside, learn how to secure the organization's interior as well as the exterior to prepare for future attacks and manage risks.

  • 6 Major Trends Shaping the Future of Security

    Sponsored by: Box

    This white paper outlines the 6 major trends that are changing IT security as we know it.

  • Examining File Sync and Sharing Security

    Sponsored by: IntraLinks, Inc

    Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.

  • The Keys to BYOD Security Success

    Sponsored by: Dell, Inc. and Intel®

    In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.

  • Simplify Saas and On-premises Integration

    Sponsored by: Oracle Corporation

    Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.

  • Reviews and Ratings for 11 Risk Management Products

    Sponsored by: RSA

    In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.

  • Data Security: Preparing for the Compliance Landscape of Tomorrow

    Sponsored by: Absolute Software

    Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.

  • Case Study: Ensuring Automated Access Governance

    Sponsored by: RSA

    In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.

  • Network Security 3 Phase Framework

    Sponsored by: Fortinet, Inc.

    This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.

  • Secure Federal Data and Support Your Mobile Workforce

    Sponsored by: Absolute Software

    This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.

  • Cloud Security - Why Traditional Measures Won't Cut It

    Sponsored by: Microsoft

    In this white paper, you will uncover how to protect data from known and unknown threats to using a cloud-based security strategy. View now to learn more.

  • Building a Layered Defense Against Data Breaches

    Sponsored by: Absolute Software

    This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.

  • The Evolution of Provisioning

    Sponsored by: RSA

    This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.

  • Cybersecurity Trends of 2015: A View from the Front Lines

    Sponsored by: FireEye

    In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.

  • Top 10 Data Security Tips to Mitigate Threats

    Sponsored by: Absolute Software

    This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.

  • Web App Security Top 10 Risk Mitigation Techniques

    Sponsored by: Fortinet, Inc.

    This white paper lays out the top 10 challenges of and threats to web app security. View now to learn the corresponding 10 risk mitigation techniques to protect web apps.

  • Breaking Bad: The Risk of Insecure File Sharing

    Sponsored by: IntraLinks, Inc

    This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.

  • Running the Risk: Why a Generation of Sharing Could Be Good for Business

    Sponsored by: Aruba Networks

    This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.

  • The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain

    Sponsored by: Absolute Software

    This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.

  • Today's Top Security Risks Revealed

    Sponsored by: Hewlett-Packard Company

    This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.

  • Bring Your Own Device: Policy Considerations

    Sponsored by: Good Technology

    Access this white paper to learn everything you need to know when building a clear and concise policy document for your BYOD strategy.

  • Avoiding the Headlines: 5 Critical Security Practices to Implement Now

    Sponsored by: CloudPassage

    Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.

  • Control Your IT Staff

    Sponsored by: BalaBit

    In this white paper, discover how privileged activity monitoring can easily collect data about what your privileged users are doing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.