Research Library

Powered by

Security Research

  • Cloud usage is now more than 90%, but IT is struggling to keep up. Are you?

    Sponsored by: McAfee, Inc.

    93% of organizations are utilizing some form of cloud service, but 49% are delaying cloud deployments due to a gap in cybersecurity skills. Review this infographic to learn where the primary security concerns lie and how to keep cloudy skies from raining.

  • Building Trust in a Cloudy Sky

    Sponsored by: McAfee, Inc.

    There's no denying that this is the future of computing as many adopt a "cloud first" mindset, but many are still wary of the cloud's lingering reputation for poor security. Read this report to see how your cloud security strategy stacks up, which areas you may be neglecting, and how to maintain top-notch security in the "cloud first" era.

  • Hill Country Memorial Hospital Case Study

    Sponsored by: D-Link

    Hill Country Memorial Hospital needed to upgrade its analog cameras and improve security across its campus. Access this case study to learn how they were able to implement an intelligent mix of indoor/ outdoor IP cameras plus video management software and achieve excellent resolution and complete campus coverage.

  • Preparing for the New OWASP Top 10 and Beyond

    Sponsored by: F5 Networks

    Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.

  • Discover how BorrowersFirst chose their colocation provider

    Sponsored by: Peak10

    In this case study, learn why the online lending company BorrowsFirst chose Peak 10 + ViaWest as their colocation provider. Click inside to learn what they gained like quick and simple deployment, simplified compliance management, and more.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • 3-Fold Approach and Best Practices to Cyber Security

    Sponsored by: Citrix

    71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.

  • Inside Online Carding Courses Designed for Cybercriminals

    Sponsored by: Digital Shadows

    Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.

  • Top 4 Ways to Strengthen Security with PC Lifecycle Management

    Sponsored by: Dell EMC

    Endpoints remain the number one source for security breaches, which is why it's more important than ever to reduce risk by staying up to date with the latest security advancements. Download this resource to discover how PC lifecycle management can reduce security risks for your organisation in 4 key ways.

  • The Complete Guide to Building a Security Culture

    Sponsored by: Trustwave

    IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.

  • Payer's Place in the Healthcare Ecosystem Keys to Success

    Sponsored by: HealthEdge

    Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.

  • Five Risks of Ignoring PC Life-Cycle Management

    Sponsored by: Dell EMC

    If you ignore PC life-cycle management you put your entire organization at risk. Want proof? Learn about five significant risks you face, how to circumvent them, and gain access to a Forrester report that will help you optimize your PC life-cycle management with ease.

  • CW ASEAN – November 2017: How managed security services help to reduce cyber risk

    Sponsored by:

    In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.

  • Q&A: How to Think Smarter About Database Security

    Sponsored by: Trustwave

    Inside this Q&A with Raul Gutierrez, principal global security architect at Trustwave uncovers steps to take to maintain compliance with the new data protection and privacy laws, and help eliminate vulnerabilities in your environment.

  • Real- World Examples: ROI- Results

    Sponsored by: HealthEdge

    Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.

  • 4 Steps to Kick-Start Your Security Program

    Sponsored by: LogMeIn Rescue

    Your customers trust you to protect their data, so it is crucial to retain that trust by making security a top priority. Learn how you can protect customers and provide a better overall experience.

  • How to Build a Rock-Solid Software Security Initiative in 5 Steps

    Sponsored by: Synopsys

    Find out how security pros and app development teams can work together better to ensure app security, and discover your roadmap to building a sound software security initiative.

  • Securing the Active Directory Foundation

    Sponsored by: Quest

    In this infographic, learn what the government is doing to help better ensure a strong and secure Microsoft Active Directory environment.

  • Cloud Security in 2 Minutes

    Sponsored by: AWS-Cisco

    Instead of adding hardware to their network, many organizations are moving to the public cloud. The problem is that this can increase your attack surface and vulnerability. Take 2 minutes to learn how entity modeling helps monitor threats, data exfiltration, and more in public clouds, private networks, and hybrid environments.

  • 9 Best Practices for Active Directory Security

    Sponsored by: Quest

    This e-book explores how a typical insider threat unfolds, and details 9 critical security best practices that minimize the risk of the internal threat to your Microsoft Active Directory Systems.

  • Protecting Endpoints Everywhere

    Sponsored by: Cisco Umbrella

    In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.

  • Cisco Stealthwatch Cloud, Public Cloud Monitoring

    Sponsored by: AWS-Cisco

    You need a service that provides public cloud security monitoring and visualization services for AWS infrastructure using advanced modeling and machine learning techniques. See reviews from IT pros that have used this technology and their unfiltered thoughts about the product.

  • Cisco Stealthwatch Cloud Free Trial

    Sponsored by: AWS-Cisco

    If you want to compete in modern business, you need to adopt the cloud. You also need a way to secure your public cloud, private network, and/or hybrid environment. Access this free trial of Cisco's Stealthwatch Cloud, a software-as-a-service cloud security tool for visibility and threat detection.

  • The Hiker's Guide to Software Security

    Sponsored by: Synopsys

    Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.

  • Building Effective Azure Active Directory Practices

    Sponsored by: Quest

    In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.