Research Library

Powered by

Security Policies Research

  • The CASB Challenge: APIs or Proxies?

    Sponsored by: Palerra Inc.

    Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.

  • Top Phishing Attacks: Discovery and Prevention

    Sponsored by: Agari

    Learn the behaviors of, and remedies for, phishing attacks that are targeting enterprises in ever increasing numbers.

  • Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

    Sponsored by: A10 Networks

    Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Provide the Ideal Frontline Firewall Defense

    Sponsored by: Barracuda Networks

    Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.

  • Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • The Business Value of Printer Security

    Sponsored by: HP

    This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more.

  • Fragmentation: The "Silent Killer" of Your Security Management Program

    Sponsored by: ThreatConnect

    This paper looks at the issues caused by security fragmentation and lays out a path towards better security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • When Your IAM Policy Encounters the Internet of Things

    Sponsored by: Unisys

    Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.

  • The Incident Response Makeover Guide

    Sponsored by: Exabeam

    Learn how to make over stalled-out incident response programs with SOC automation, utilize advanced behavior analytics, and amplify the power of your security analysts in order to reap the benefits of boosted ROI, data loss prevention, and lightning-fast incident response.

  • Unify Security Intelligence to Create a Strong Threat Detection and Prevention Ecosystem

    Sponsored by: LogRhythm, Inc.

    In this white paper by Dr. G.W. Ray Davidson, discover how you can unify your security intelligence processes through automation and integration. Learn how you can develop a classification scheme to determine what data is most important to protect, expand this risk scoring to all areas of your enterprise, and more.

  • Case Study: Technology Manufacturer Stops TeslaCrypt Attack

    Sponsored by: Carbon Black

    Download this case study to learn how to unravel, remediate, and moreover protect against all endpoint attacks (such as TeslaCrypt ransomware). Implement complete endpoint visibility with a proactive response platform that can reduce your number of breaches to zero.

  • IoT Security Testing: Cover All Your Bases

    Sponsored by: Synopsys

    Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.

  • Your Roadmap to IoT and Cybersecurity Trends

    Sponsored by: Unisys

    See how security and privacy considerations of the internet of things can be addressed, how to form a strategy for public awareness of cybersecurity, and overall and formative cybersecurity trends. Learn the benefits and pitfalls of this ever changing landscape.

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Cloud App and Service Adoption: 11 Key Steps IT Should Take

    Sponsored by: Symantec + Blue Coat

    You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.

  • A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats

    Sponsored by: LogRhythm, Inc.

    In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.

  • Stop Malware Attacks Before They Strike With This Network Threat Analytcs Module

    Sponsored by: LogRhythm, Inc.

    This white paper explores how LogRhythm's Network Threat Analytics module can help you detect, prioritize, and neutralize cyber threats before they attack. Learn how you can immediately detect botnets and other malware, quickly identify disguised data transfers, and more.

  • Discover the Most Important App Security Testing Basics

    Sponsored by: Synopsys

    Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.

  • How to Use an Incident Response Policy to Better Collaborate

    Sponsored by: Delta Risk

    In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.

  • The Three Essential Elements of Next-Generation Endpoint Protection

    Sponsored by: CrowdStrike

    Discover an explanation of the essential elements of next-gen endpoint protection, an evaluation matrix for comparing the potential impact of different solutions, a list of the top questions to ask potential vendors, and tools to help you measure and compare different solutions.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.