Research Library

Powered by

Security Research

  • Run Skype for Business as a Secure Virtual App

    Sponsored by: Citrix

    Organizations of every size are adopting virtualized Skype for Business as the perfect solution to meet user expectations and security requirements. Learn more.

  • Addressing Today's Endpoint Security Challenges

    Sponsored by: Citrix

    Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.

  • Machine Learning in Cyber Security

    Sponsored by: Recorded Future

    AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.

  • The New Face of Cloud-Based Access management

    Sponsored by: Gemalto

    Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

  • Hybrid Active Directory Security and Governance

    Sponsored by: Quest

    Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.

  • 2017 Global Security Report

    Sponsored by: Trustwave

    The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global report, read about the current state of IT security, and how it fares against evolving threats from hackers and cybercriminals.

  • Strengthen Your Defenses Against Cybercrime

    Sponsored by: Mimecast

    Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.

  • Hybrid Active Directory Security Detection and Alerting

    Sponsored by: Quest

    Changes to Active Directory are being made daily without your knowledge. Read this e-book to uncover how to suspect inappropriate changes and take action to protect yourself.

  • Hybrid Active Directory Security Investigation and Recovery

    Sponsored by: Quest

    Discover how to ensure user security while working with Active Directory as well as identify changes across multiple systems.

  • Equinix Delivers Security Intelligence with Cloud-Based SIEM

    Sponsored by: Splunk

    Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.

  • 4 Steps to Cloud Access Management

    Sponsored by: Gemalto

    While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe a profitable.

  • One More Reason to Use HCI: Bolstering Security

    Sponsored by: VMware

    Find out exactly how HCI allows users to now adopt a far more flexible security model that can run on any hardware, including existing x86 investments, with simplified management thanks to the introduction of VMware vSAN 6.6.

  • Email Security Risk Assessment

    Sponsored by: Mimecast

    Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.

  • Leveraging Industry-First HCI Innovations to Enhance Security, Lower TCO and Increase Performance

    Sponsored by: VMware

    As one of the (relatively) new kids on the block, hyper-converged infrastructure (HCI) is the building block to the next-generation's software-defined data center. Read on to learn from our experts about what sets HCI apart from other technologies as well as how to use it move your organization forward without breaking the bank.

  • Remediation and Mitigation for Windows Active Directory Security

    Sponsored by: Quest

    Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.

  • Customers Showcase Security Success

    Sponsored by: Splunk

    Data security is vital for companies in protecting sensitive business and customer data. Read this e-book to uncover 15 customer success stories and learn more about analytics-driven security and how to maintain an uninterrupted business.

  • Computer Weekly – 15 August 2017: Tech takes the lead in the Tour de France

    Sponsored by:

    When watching sports on television you are consistently confronted with a barrage of data, giving insight into the most complicated inner workings of football, tennis, cricket, etc., but never in cycling. Access this week's ComputerWeekly to learn how IoT is being introduced to the Tour de France and what that means for the viewer.

  • It's Time to Replace your Antivirus

    Sponsored by: Carbon Black

    Discover how the NGAV approach incorporates endpoint security that goes beyond malware to protect its users while integrating features that target tools, techniques, tactics, and procedures.

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Endpoint Security Review: Cb Defense

    Sponsored by: Carbon Black

    Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.

  • Don't Overlook Email When Planning for GDPR Compliance

    Sponsored by: Mimecast

    With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.

  • Remedying the Email Security Gaps in Microsoft Office 365

    Sponsored by: Mimecast

    Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.

  • Cloud Security: 2017 Spotlight Report

    Sponsored by: Quest

    Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

  • What is Next-Generation Antivirus, or NGAV?

    Sponsored by: Carbon Black

    Next Generation Antivirus (NGAV) prevents cyberattacks on a large spectrum and provides more coverage with less resource requirements. Learn more about NGAV in this webcast.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.