Research Library

Powered by

Security Threats Research

  • Threat Research: Targeted Attacks on Enterprise Mobile

    Sponsored by: Kingpin Communications

    This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.

  • The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks

    Sponsored by: Kingpin Communications

    In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.

  • Top 6 Cyber Security Threats to iOS Devices

    Sponsored by: Kingpin Communications

    This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.

  • Checkpoint: Demystifying Mobile Security Attacks

    Sponsored by: Kingpin Communications

    In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause. Access this paper to arm yourself and identify how to best detect Android malware applications and rootkits, man-in-the-middle attacks, and more.

  • Encryption: Quickly Deploy Security Solutions

    Sponsored by: Oracle Corporation

    Access this data sheet and learn ways to quickly deploy encryption and other security solutions by centrally managing encryption keys.

  • Defense-In-Depth: Database Securing

    Sponsored by: Oracle Corporation

    Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.

  • Breach Detection System: Detecting the Pros and Cons

    Sponsored by: Fortinet, Inc.

    In this report by NSS Labs, independent experts take a closer look at a breach detection system. Evaluate the strengths, weaknesses, opportunities, and threats of this network security approach to determine if it's the right step for your enterprise.

  • Sandbox Technology: Building an Effective Breach Detection and Response Strategy

    Sponsored by: Fortinet, Inc.

    This white paper highlights the use of sandboxes in conjunction with established security infrastructure for threat and data breach protection. Read on to learn the best practices for choosing a sandbox solution that will be successful in protecting your networks and infrastructures.

  • Defend Against the Undetected

    Sponsored by: Fortinet, Inc.

    This white paper discusses how a comprehensive internal and external solution can help to protect your perimeter, your core, your endpoints, and everything else in-between. You'll also learn how automating the interaction between prevention, detection, and mitigation and remediation creates an efficient and effective defense strategy.

  • Website Security Threat Report

    Sponsored by: Symantec Website Security

    By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.

  • Why Next-Generation Firewalls and Sandboxes Are Not Enough

    Sponsored by: OpenDNS

    In this webcast, learn the steps of the kill chain to better understand how to bolster your existing defenses against emerging and advanced threats.

  • Forrester Endpoint Thought Leadership Paper

    Sponsored by: Palo Alto Networks

    This white papers shows solutions that deliver strong integration between network and endpoint security.

  • Speak SMB Security: How You Can Be a Security Thought Leader

    Sponsored by: OpenDNS

    In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.

  • Executive Viewpoint: Getting Tough on Security Threats

    Sponsored by: F5 Networks

    In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.

  • Shifting Threat Environment Undercuts Defenses

    Sponsored by: Symantec Website Security

    In this white paper, learn how to patch vulnerabilities and detect hidden advanced threats on your network and website.

  • Comparing Security Features of Old and New Operating System Rollouts

    Sponsored by: Microsoft

    This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.

  • Utilizing Security Ratings for Enterprise IT Risk Mitigation

    Sponsored by: BitSight

    This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Read on to learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.

  • Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?

    Sponsored by: Commvault

    In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.

  • Modernize and Secure your Business

    Sponsored by: Microsoft

    In this solution brief, you'll learn how modern businesses are meeting the expectations of workers to be able to work anywhere, anytime on virtually any device. Discover ways to manage devices and provide workers with secure access to the corporate data and apps they need.

  • Intro to Faster Threat Intelligence

    Sponsored by: OpenDNS

    In this webcast, learn how to dust for clues hackers leave behind in your network to remedy security threats before they escalate to issues.

  • Cisco Advanced Malware Protection for Endpoints

    Sponsored by: Cisco

    This white paper shows you endpoint security that goes beyond point-in-time detection to provide the level of visibility and control you need to stop advanced threats.

  • Layered Security Strategies for a Mobile-First World

    Sponsored by: Microsoft

    This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.

  • Advanced Threat Defense

    Sponsored by: Blue Coat Systems

    This e-guide will teach you the steps your business should take to protect against new, more advanced threats.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.