Research Library

Powered by

Security Research

  • How CAME Group Protects Endpoints from Targeted Cyber-Attacks

    Sponsored by: Palo Alto Networks

    Working with a trusted IT partner, CAME Group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.

  • Secure Access for Retail

    Sponsored by: Fortinet, Inc.

    The wireless network must become a springboard to exploit new technologies without adding to the security risks. This resource highlights how the retail industry can offer Wi-Fi internet to their customers without fear of security failures.

  • Industry Assessment: Key Findings on Effective Threat Protection

    Sponsored by: Check Point Software Technologies Ltd.

    This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.

  • Exposing the Unknown: How Sanboxing Technology Fights Modern Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.

  • A Stronger Silver Lining in the Cloud

    Sponsored by: Palerra Inc.

    In this time-saving infographic, discover key figures on cloud usage among enterprises and IT professionals. Learn which services are being used, the true cost of a data breach, why security is lacking on the cloud, and what is being done about it.

  • Understanding behavioural detection of antivirus

    Sponsored by:

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.

  • How to Conquer the Biggest AWS Adoption Challenges

    Sponsored by: Palerra Inc.

    Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.

  • Solution Guide

    Sponsored by: Fortinet, Inc.

    Learn the features of a tool which will work to secure your network, even as IT security becomes more complicated and vulnerable. By recognizing the danger presented by wireless networking, you can effectively prepare for the modern explosion of network connected wireless devices.

  • Use Secure Cloud and Scalability to Revolutionize B2B Payments Market

    Sponsored by: Armor

    Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.

  • Azure Security and Identity Management Best Practices

    Sponsored by: Rackspace

    Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.

  • Secure Access for K-12 Education

    Sponsored by: Fortinet, Inc.

    Learn how classrooms and networks with specific needs can benefit from secure wireless networking without excessive cost or loss of features. Access now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.

  • Integrated Secure Access Deployment Guide

    Sponsored by: Fortinet, Inc.

    This deployment guide shows how to unify the management of wired and wireless infrastructure and security on to one platform and negate the need for multiple separate appliances.

  • Cloud Access Security Brokers Fill Critical Enterprise Void

    Sponsored by: Palerra Inc.

    In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.

  • Cloud Security Automation: Are We Up To The Task?

    Sponsored by: Palerra Inc.

    In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.

  • A Unified View for Proactive Security

    Sponsored by: Fortinet, Inc.

    Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.

  • Cloud Security Spotlight Report

    Sponsored by: Palerra Inc.

    This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.

  • Ransomware: Attack Trends, Prevention, and Response

    Sponsored by: Check Point Software Technologies Ltd.

    Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.

  • Overcome the Limitations of Traditional Cloud Security for Office 365

    Sponsored by: Palerra Inc.

    See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Discover how the mobile threat landscape is changing as well as staying the same. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.

  • Buff Up Your Web Apps

    Sponsored by:

    Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • Infrastructure Secure Access Deployment Guide

    Sponsored by: Fortinet, Inc.

    Learn how you can deploy a secure, premises managed, wireless LAN system to protect your network. From the access layer to internal segmentation, you'll see how to dramatically improve the security of your wireless network.

  • Insider Threat Spotlight Report

    Sponsored by: Palerra Inc.

    In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.

  • Spotlight on Insider Threats to Cloud Applications

    Sponsored by: Palerra Inc.

    In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.

  • Ransomware: What You Need to Know

    Sponsored by: Check Point Software Technologies Ltd.

    This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.