Research Library

Powered by

Vulnerability Assessments Research

  • Application Security Assessment

    Sponsored by: Kaspersky Lab

    Access this app security assessment to uncover and mitigate vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.

  • True Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Discover an alternative to current, ineffective DDoS protection solutions in this short video. See true multi-vector protection and always-on application availability that is also scalable, efficient, and affordable.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.

  • Don't Guess. Test. Uncover Your Security Vulnerabilities

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Protecting the Enterprise from User Security Vulnerabilities

    Sponsored by: RES Software

    Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.

  • The Total Economic Impact of Software Testing Tools

    Sponsored by: Synopsys

    The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of security tools on their organizations. Discover how you can catch and fix quality defects and security vulnerabilities om source code earlier in the software development cycle when they are cheaper and easier to address.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • Healthcare Security: The Simplest Way to Stay Ahead of Attacks

    Sponsored by: OpenDNS

    In healthcare, a ransomware outbreak can lead to a true life or death situation – and cybercriminals know that you'll pay up to decrypt patient data. Access this brief to find out how you can simplify PHI protection and close security gaps to significantly reduce malware from getting in and data from being exfiltrated.

  • Security Testing Practices and Priorities

    Sponsored by: Trustwave

    This report shows the survey results from Osterman Research about security testing within various organizations. Discover which security issues organizations had experienced most frequently within the past year and how vulnerable many of these organizations were.

  • The Security Survival Guide for Growing Businesses

    Sponsored by: Trustwave

    This guide will walk you step by step through the reasons why your security may be suffering and offer practical tips for addressing your pain points so you can take your data protection to the next level.

  • Assess Your Open File Shares to Combat Security, Compliance Risk

    Sponsored by: STEALTHbits

    Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.

  • Risk Assessment

    Sponsored by: STEALTHbits

    In as little as 5 hours, you'll learn your top 5 data security vulnerabilities and get insight on how to patch them up.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Trustwave

    There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

  • Addressing the Full Attack Continuum (BDA WP)

    Sponsored by: Cisco Systems, Inc.

    It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.

  • Open Access : Restrict access where it need be restricted

    Sponsored by: STEALTHbits

    Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.

  • What's the Best Way to Handle External Security Auditors?

    Sponsored by: Dell Software

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

  • Cyber Threats to Online Shopping Cheer

    Sponsored by: Neustar

    Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.

  • Case Study: Reclaiming Website Security and Control

    Sponsored by: Neustar

    Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.

  • 2016 Neustar DDoS Attacks & Protection Report

    Sponsored by: Neustar

    This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.