Research Library

Powered by

Security Research

  • 5 Reasons Endpoint Security Must Move to The Cloud

    Sponsored by: CrowdStrike

    Discover why the cloud can be a top choice when looking to secure endpoints, and what benefits it can provide your organization by the way of cost, flexibility, and agility.

  • 3 Steps to Secure Cloud Database-as-a-Service

    Sponsored by: Oracle Corporation UK Ltd

    Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.

  • Cybersecurity During a Merger: CrowdStrike on Key Risks and Due Diligence

    Sponsored by: CrowdStrike

    In this interview with CrowdStrike's Steve Chabinsky, learn key risk factors such as cybersecurity that organizations encounter during the merger and acquisition due diligence process and how to avoid them.

  • Securely Extend Your Content Externally

    Sponsored by: IntraLinks, Inc

    External content sharing requires you to strike a balance between security and productivity that is difficult to find. Access this webinar to explore the security and cost challenges of sharing beyond your firewall as well as keys to secure, timely collaboration practices.

  • Evolving Threats: Changing Expectations for Enterprise Firewall Solutions

    Sponsored by: Fortinet, Inc.

    The need for the next evolution of enterprise security solutions is more pressing than ever. This Infographic provides insight into current key trends that are driving the evolving threat landscape. Read on to uncover unique strategies that you can employ effectively across your entire network to counter these threats.

  • What Are The Security Benefits of Using Thin Client Devices?

    Sponsored by: Dell, Microsoft and Citrix

    Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.

  • Dell Windows 10 Thin Clients Boost Virtual Desktop Security

    Sponsored by: Dell, Microsoft and Citrix

    Dell is now offering thin client devices configured with Windows 10 to enable workspaces to take advantage of the security and management features built into Windows 10. This exclusive e-guide takes a look at what sets apart thin clients with Windows 10 apart from comparable devices.

  • Is Your Security Ops Strategy Ready for the Cloud?

    Sponsored by: Alert Logic

    In this presentation form Forrester, evaluate the impacts that cloud adoption has had on cloud security operations and the related challenges and benefits that IT professionals experience from this.

  • Why So Many Enterprises Lack Proper Authentication Methods

    Sponsored by: RSA Softcat

    Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for handling ransomware attacks. You'll get expert advice on how to improve your network security strategy and defend against advanced malware threats.

  • How to Mitigate Shadow Cloud Services Security Risks

    Sponsored by: IBM

    Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services. Discover a few simple steps to identify shadow cloud apps and protect your data.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • 2016 Mobile Applications Security Update

    Sponsored by: Appthority

    Here's a comprehensive review of 2 major vulnerability types surfacing in Android apps: autorooting and overlay malware. Plus get analysis on whether Apple's faster app review times coincided with vulnerabilities that have plagued the App Store. And if that weren't enough, find out if the revised Android permissions model makes their apps safer.

  • Advanced Authentication Strategies for Detecting Real-time Threats

    Sponsored by: HID

    How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.

  • Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts

    Sponsored by: Appthority

    This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.

  • Do You Have the Right Authentication Tools to Keep the Bad Guys Out?

    Sponsored by: RSA Softcat

    Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.

  • From IoT to IDoT: Securing the Identity of Things

    Sponsored by:

    With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.

  • Top Ten Best Practices for AWS Security

    Sponsored by:

    Learn 10 best practices when it comes to securing your transition to AWS. Discover common pitfalls as well as little-known secrets that can mean the difference between smooth sailing and a catastrophic breach on the high seas of the cloud.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by:

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • Tick! Tock! Have You Detected the Intruder Inside Your Network Yet?

    Sponsored by: Dell Software

    In this precautionary white paper, get in the mind of a cyber attacker and learn the key ways for preventing a breach by quickly identifying suspicious behavior and containing the attackers inside your network. Also, learn about key benefits and limitations of both native tools and security information and event management (SIEM) solutions.

  • 10 Principles of Database Security Program Design

    Sponsored by: Trustwave

    Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.

  • Crafting an Identity-Based Security Strategy for Cloud

    Sponsored by: Hewlett Packard Enterprise

    IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.

  • Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration

    Sponsored by: Dell Software

    This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.

  • Security Audit Planning and Preparation: Engage Early and Often

    Sponsored by: Dell Software

    In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.

  • How Audit Compliance and Cloud Adoption Affects IT Security

    Sponsored by: Dell Software

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.