Research Library

Powered by

Security Policies Research

  • 7 Data Loss Prevention Suite Providers Compared

    Sponsored by: Blue Coat Systems

    In this report, Forrester Research identified, researched, and analyzed 7 top data loss prevention providers. Learn how each provider measures up and discover how to make an educated decision in choosing which might be the best for your enterprise.

  • How to Get More Signal, Less Noise for Your SIEM

    Sponsored by: ExtraHop

    Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.

  • Are we trusting social networks too much?

    Sponsored by:

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Confronting Enterprise Security Risk: The State of Incident Response

    Sponsored by: ServiceNow

    In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.

  • An Essential Checklist for Your Security Response Solution

    Sponsored by: ServiceNow

    Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Respond to Threats Faster and More Effectively Than Ever

    Sponsored by: ServiceNow

    Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.

  • A New Paradigm for Identity Assurance

    Sponsored by: RSA

    Learn how to take authentication to the next level. Discover how to determine the risk associated with the action a user is about to take, based on context gathered over time, continuously.

  • Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017

    Sponsored by: Neustar

    Discover if your current DNS strategy stacks up to the next generation of internet demands. Learn why it makes sense to have a backup DNS provider, what IoT insecurities threaten your business, and more.

  • Status Quo Creates Security Risk

    Sponsored by: ServiceNow

    Discover what 184 IT pros think are the most important factors that lead to incident response excellence, such as security and IT tool integration, the ability to know whether a security incident impacts a critical system and strong collaboration between the incident response and IT operations teams.

  • Bringing IT and Security Together for Better Security Response

    Sponsored by: ServiceNow

    Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.

  • How to Secure Your Mainframes in Today's Threat Landscape

    Sponsored by: Thycotic

    Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.

  • HPE Enterprise Secure Key Manager Best Practices

    Sponsored by: Hewlett Packard Enterprise

    Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.

  • A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Discover why it takes so long for organizations to discover when they have been breached. Learn how to mitigate, remediate, and recover faster.

  • Data Protection and Encryption Driven by GDPR Compliance

    Sponsored by: Hewlett-Packard Enterprise

    Discover how to manage customized encryption keys, particularly at high volumes, while minimizing overhead costs. Learn how "one size fits all" encryption might not be the best for your company, and what role your encryption can play in GDPR compliance.

  • Worldwide DDoS Attacks & Protection Report

    Sponsored by: Neustar

    Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.

  • DDoS Attack Cybersecurity for 2017

    Sponsored by: Neustar

    Learn about the modern DDoS landscape, what to expect from future trends, and how to keep the lessons learned from last year's attacks primed and ready to keep your organization safe.

  • Securely Go Digital with Your Business Processes

    Sponsored by: Cisco

    Discover two use cases of small business owners and the path that led them to become "secure digitizers", enabling a first-move advantage in terms of digitization for a smaller organization. Learn how to secure roaming users, implement secure guest access, scale security along with the network, and more.

  • Beyond Prevention: Cisco‚Äôs Next Generation Endpoint Security

    Sponsored by: Cisco

    Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.

  • How to Speed Up Your Breach Detection Rate

    Sponsored by: Cisco

    Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.

  • Navigate Your Way Around Ransomware

    Sponsored by: Barracuda Networks

    Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works, the most common variants that are active today, and 3 steps to recover from ransomware.

  • 5 Tips for Choosing a Next-GenerationEndpoint Security Solution

    Sponsored by: Cisco

    Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.

  • Financial markets regulatory outlook 2017

    Sponsored by:

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Reengineering The Internet for Stronger Network Security

    Sponsored by: Neustar

    Discover how to make the internet safer, faster, and more efficient by tackling today's threats and mitigating website downtime, keeping your team calm and efficient.

  • How to Tackle Endpoint Defense Issues

    Sponsored by: Carbon Black

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.