Research Library

Powered by

Security Research

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Cloud App and Service Adoption: 11 Key Steps IT Should Take

    Sponsored by: Symantec + Blue Coat

    You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.

  • It's 2016— Do You Know Where Your Content and Data Is?

    Sponsored by: IntraLinks, Inc

    Do you know where your content goes once it leaves the company? Who can access it? There's been so much focus on accessing content faster and from further away, but we've lost track of security. Access this blog to learn about data sovereignty and how to track your data no matter where it goes.

  • The Current and Future States of Cybersecurity in the Digital Economy: Part 1

    Sponsored by: Unisys

    In part 1 of this 3-part cybersecurity report, explore the vulnerabilities in ICS systems, as well as methods for assessing risk in your ICS cybersecurity plan – helping you combat costly and damaging attacks to critical ICS systems.

  • The Anatomy of DDoS Attacks And Best Practices for Preventing Them

    Sponsored by: Arbor Networks

    This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.

  • Application Development Security Requires Forethought

    Sponsored by: Synopsys

    In this e-guide learn not only how to stay ahead of the competition with a quick development cycle, but also how to ensure the final product stays safe and sound.

  • How IAM Addresses Unstructured Content Security Risks

    Sponsored by: STEALTHbits

    Identity and access management (IAM) can be a complex and necessary obstacle for enterprises to conquer in order to better secure critical data. Learn how to tackle the biggest challenge in IAM: figuring out how to handle unstructured content in the enterprise within an IAM strategy.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by:

    This virtual event, produced jointly by ISACA,, and focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • Extending Global Load Balancing to the Cloud With Secondary DNS

    Sponsored by: Dyn

    Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks.

  • The Connection between IoT and DDoS Attacks

    Sponsored by: Arbor Networks

    In this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.

  • 6 Actions, CIOs, and CISOs Can Adopt to Take Charge of their Cloud Strategy

    Sponsored by: Symantec + Blue Coat

    This solution brief guides you through 6 actions that CIOs and CISOs can take to put themselves in charge of cloud strategy. Access now to transform your IT department from a cost center and overhead expense to a profit center that contributes to business and operational efficiency.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Symantec + Blue Coat

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

  • A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats

    Sponsored by: LogRhythm, Inc.

    In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.

  • Managing Content Beyond the Corporate Walls: Working in the Cloud

    Sponsored by: ASG

    If your organization doesn't provide employees with proper content management, they'll make up their own, putting security and compliance at risk. Access this white paper to learn how to manage your organization's content beyond your firewalls and corporate structure, and why the path to success is through the cloud.

  • A New Approach to the Security Ecosystem

    Sponsored by: Unisys

    Discover how micro-segmentation can firmly handle your enterprise's approach to security and connecting the disparate parts of your network. Learn how endpoint security, network protection, mobile devices, and more can all coexist effectively and safely in your organization's infrastructure.

  • Stop Malware Attacks Before They Strike With This Network Threat Analytcs Module

    Sponsored by: LogRhythm, Inc.

    This white paper explores how LogRhythm's Network Threat Analytics module can help you detect, prioritize, and neutralize cyber threats before they attack. Learn how you can immediately detect botnets and other malware, quickly identify disguised data transfers, and more.

  • 8 Best Practices to Ensure Compliance When Adopting Cloud Apps Services

    Sponsored by: Symantec + Blue Coat

    Learn 8 ways to begin developing a strategy that will enable you to adopt cloud applications and services while still protecting data. Not only protecting data, but maintaining compliance as well.

  • 2016 State of the Channel Ransomware Report

    Sponsored by: Datto

    93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.

  • How to Fend Off Hackers with Frequent App Security Testing

    Sponsored by: Synopsys

    In this expert guide, learn about the realities of the threat hackers pose to your business, as well as several ways that constant app security testing can help close up the gaps in which hackers could sneak in. Then, learn some of the challenges that implementing security testing could pose.

  • Increase Security, Not Complexity

    Sponsored by: Fortinet, Inc.

    This short video introduces the Fortinet Enterprise Firewall, which can secure your entire network, end to end, and can scale in tandem with the increasing intricacy of attacks. View now and learn how to unlock increased security and performance without adding on unnecessary complexity.

  • Ransomware Made MSPeasy

    Sponsored by: Datto

    In the first 3 months of 2016, companies lost $200 million to ransomware. Learn about today's leading ransomware threats and how to educate your customers on the importance of investing in security, backup and recovery solutions.

  • Discover the Most Important App Security Testing Basics

    Sponsored by: Synopsys

    Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.

  • Top Priority IT Tasks: Risk Management and Regulatory Compliance

    Sponsored by: Dell Software

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.