Research Library

Powered by

Security Policies Research

  • Financial Institution Uses BoKs to Centralize Access Controls Across 50,000 Servers

    Sponsored by: FoxT

    In this case study, you will learn how to centralize and automate the user account administration across your servers, enabling you to allocate fewer resources to security administration and control access. Access this study to address key regulatory compliance mandates.

  • The Essential Guide to Privileged Access Management

    Sponsored by: FoxT

    In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.

  • Your Guide to Zen and the Art of Delivering Identity Federation

    Sponsored by: Radiant Logic, Inc.

    In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.

  • 5 Steps to Empowering Employees for Secure Cloud Service Usage

    Sponsored by: IBM

    This brief infographic highlights five necessary steps to secure cloud service usage. Find out how you can discover, identify, and track cloud application usage and ultimately empower employees to safely use cloud services.

  • 2015 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    In this report, view the impact of data breaches and observe cost trends over time. Access this global study to learn where to invest your resources to mitigate the chance of an attack and how proper business continuity management can reduce the costs of data breaches for your organization.

  • Sensible one-page thoughts on performance: People at work

    Sponsored by:

    Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.

  • Reimagining Security: A New Way to Think

    Sponsored by: IBM

    Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.

  • Healthcare Data Access Compliance

    Sponsored by:

    Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.

  • Security Information and Event Management FAQs

    Sponsored by: AccelOps Inc.

    In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.

  • 5 Steps for Stronger Advanced Threat Protection

    Sponsored by: Blue Coat Systems

    This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Security and Privacy on the Encrypted Network

    Sponsored by: Blue Coat Systems

    This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.

  • Enabling the Connected Campus: Mobility Best Practices for Higher Education

    Sponsored by: VMware, Inc.

    IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.

  • Secure-by-Design Protection for Application and Desktop Virtualization

    Sponsored by: Citrix

    This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.

  • 2015 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.

  • Threat intelligence sharing and the government's role

    Sponsored by:

    This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.

  • Cyber security: Balancing risks and controls for finance professionals

    Sponsored by:

    The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.

  • Create Your Own Private ISAC: Tips for Sharing Threat Intelligence

    Sponsored by: SurfWatch Labs

    This white paper discusses how cyber security professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.

  • Security Audit Checklist

    Sponsored by: Digital Guardian

    This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.

  • Fortinet Threat Trends in 2015

    Sponsored by: Fortinet, Inc.

    This white paper presents today's four most significant cyber-security threats from the hacker's perspective. Access this resource to learn the steps that you need to take to protect your organization from being the next breach victim, as well as how to shift from a reactive to a proactive security approach.

  • Breaking Bad: The Risk of Insecure File Sharing

    Sponsored by: IntraLinks, Inc

    This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.

  • How to Avoid Today's Top 8 Enterprise Mobility Security Issues

    Sponsored by: BlackBerry

    This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.

  • The Digital Guardian Managed Security Program (MSP) Technical Overview

    Sponsored by: Digital Guardian

    In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.

  • Mobile Policies: How to Write Guidelines Employees Will Follow

    Sponsored by: BlackBerry

    This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD or COPE strategy.

  • Endpoint Security: Beyond Antivirus

    Sponsored by:

    In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.