Research Library

Powered by

Data Security White Papers

  • Keeping Applications Safe with Whitelisting

    Sponsored by: Digital Guardian

    This eguide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.

  • The Secure Mobile Enterprise

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.

  • Keep Software Secure Using RASP

    Sponsored by: Prevoty

    This expert e-guide explores if RASP is the savior of security officers or if it's just the new flavor of the week. View now to learn about the two approaches to RASP and the potential red flags of using this technology.

  • Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks

    Sponsored by: Alcatel-Lucent

    Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.

  • Oracle MAA Reference Architectures

    Sponsored by: Oracle Corporation

    View this informative white paper for a detailed discussion of four high availability reference architecture and the accompanying service level objectives that can be achieved.

  • Bringing Ideas to Life in a Continuously Protected Environment

    Sponsored by: Dell, Inc. and Intel®

    Access this case study to discover how one organization implemented leading Dell workstations and desktops to fully equip employees with a customized workspace to meet their project needs and enhance their productivity.

  • Addressing NIST and DOD Requirements for Mobile Device Management

    Sponsored by: IBM

    Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as how to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.

  • The Key to Smarter Enterprise Code Signing

    Sponsored by: Symantec

    This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.

  • OpenText Secure Shell

    Sponsored by: OpenText

    Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.

  • Top 10 Reasons to Monitor Privileged Users

    Sponsored by: BalaBit

    In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.

  • Control Your IT Staff

    Sponsored by: BalaBit

    In this white paper, discover how privileged activity monitoring can easily collect data about what your privileged users are doing.

  • Securing #GenMobile: Is Your Business Running the Risk?

    Sponsored by: Aruba Networks

    This white paper outlines a 5 step mobile security strategy to mitigating the risks created by #GenMobile. View now to learn how to adapt your data protection to prevent loss.

  • It's Time to Identify and Confront Today's Data Center Security Challenges

    Sponsored by: VMware

    In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.

  • OpenText HostExplorer

    Sponsored by: OpenText

    Inside this resource, examine a technology offering both desktop-based software and a web-to-host terminal that provides fast and reliable connections from each to mainframes and other enterprise host systems. Learn how you can benefit from the latest PC and web technologies while protecting your investments in data, information assets and systems.

  • Virtual Data on Tape: Challenges and Benefits

    Sponsored by: Veeam Software

    This white paper examines the benefits of storing virtual data on tape including reduced storage costs, improved data protection, and more.

  • Cloud Security Survey Report 2015

    Sponsored by: CloudPassage

    This comprehensive survey details what information security professionals believe is the current state of cloud security.

  • Protecting and Preserving Archived Files

    Sponsored by: Imation Corp.

    Access this white paper to learn how you can authenticate data and prevent file corruption for your archived data.

  • The Elephant in the Room: What Vendors Are Hiding about Communications Security

    Sponsored by: 8x8, Inc.

    This white paper discusses why communications vendors don't discuss their products' security and shows you how you can ensure safety, compliance and reliability in all your business communications.

  • Data Security Strategies for Next Gen Data Warehouses

    Sponsored by: IBM

    In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.

  • Striving for, and Achieving, BI and Analytics Platform Success

    Sponsored by: Birst

    The following white paper captures an organization's ability to become data-driven, with the combination of flexibility and speed, as well as the consistency and governance required by BI tech professionals. Discover how successful companies navigate the complexities of centralized and decentralized organizational models for business intelligence.

  • OpenText Exceed

    Sponsored by: OpenText

    Access this informative resource to learn about a secure, high-performing X Windows server that connects Microsoft Windows desktops to high-end X Windows applications running on UNIX and Linux servers.

  • How to Avoid Today's Top 8 Enterprise Mobility Security Issues

    Sponsored by: BlackBerry

    This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.

  • Make the Impossible Possible: Simplifying ISO Compliance

    Sponsored by: BalaBit

    This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.

  • PCIDSS Compliance and Privileged Access Monitoring

    Sponsored by: BalaBit

    This white paper explores how to control and audit data access on servers, networking devices, and virtualized applications and ensure PCI compliance.

  • A New Aproach to Payment Verification

    Sponsored by: Nexmo

    This white paper explores how to use phone number verification to ensure security and compliance in a simple process. Access now to learn why this technology is rising in prominence and uncover the seven key components to look for in a third-party service.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.