Research Library

Powered by

Security Research

  • Security & Management for your Mobile Data

    Sponsored by: Wandera

    Discover how to gain a multi-level security architecture, both on device and in the cloud, working in real-time to provide insights into your mobile data that goes beyond MDM.

  • Mobile Data Report 2016

    Sponsored by: Wandera

    Find an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Find significant new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage.

  • Mobile Security: Gain Real-Time Threat Prevention

    Sponsored by: Wandera

    Learn how to gain real-time threat prevention, compliance and data cost management for mobile devices. Discover how to block threats such as data leaks, malware, and man-in-the-middle attacks, responding with real-time policy enforcement.

  • The CASB Challenge: APIs or Proxies?

    Sponsored by: Palerra Inc.

    Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.

  • Top Phishing Attacks: Discovery and Prevention

    Sponsored by: Agari

    Learn the behaviors of, and remedies for, phishing attacks that are targeting enterprises in ever increasing numbers.

  • Put Endpoint Security in Capable Hands

    Sponsored by:

    Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.

  • Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

    Sponsored by: A10 Networks

    Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim.

  • Provide the Ideal Frontline Firewall Defense

    Sponsored by: Barracuda Networks

    Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.

  • Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • The Business Value of Printer Security

    Sponsored by: HP

    This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more.

  • 10 Critical Requirements for Optimizing Application Delivery

    Sponsored by: A10 Networks

    Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.

  • Your Guide to Business Email Compromise

    Sponsored by: Agari

    Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.

  • Your Guide to Fraudulent Invoice Email

    Sponsored by: Agari

    In this webcast, learn how to combat targeted attacks, spear-phishing, and malicious emails dressed up to look and sound legitimate.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Protecting and Empowering your Connected Organization

    Sponsored by: Microsoft

    This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.

  • Top Drivers Behind Desktop Virtualization Adoption

    Sponsored by: Dell, Microsoft and Citrix

    IT admins usually list several reasons why they use desktop and app virtualization, but one thing they can almost all agree on is that these technologies simplify management. This e-guide highlights TechTarget's Desktop Virtualization Survey detailing the top drivers of desktop and app virtualization.

  • Uncovering the True Costs of Enterprise Mobility

    Sponsored by: Wandera

    This report explores the essential findings of a TCO analysis in 5 key areas of cost, including hardware, IT resources, security, and 2 more. Access now to find out how to take a more holistic approach to calculating the TCO for enterprise mobility and defending against the associated security risks.

  • Is Your Data Secure?

    Sponsored by: Commvault

    Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.

  • Enterprise Apps OWASP Mobile Security Risks Report

    Sponsored by: Wandera

    This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.

  • Masergy's Unified Enterprise Security Solution

    Sponsored by: MASERGY

    This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.

  • Forrester Report on The Total Economic Impact of Agari Customer Protect

    Sponsored by: Agari

    This Forrester research content explores how 4 enterprises were able to stop phishing attacks by establishing an authentication loop to ensure only verified emails reached consumers. Learn how they were able to lower the cost of cybersecurity insurance, reduce the need for customer support, and increase customer engagement by 10%.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • CW Middle East Oct to Dec 2016

    Sponsored by:

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.