Research Library

Powered by

All Research

  • Artificial Intelligence & Cybersecurity for Dummies

    Sponsored by: IBM

    In this book, Artificial Intelligence & Cybersecurity for Dummies, explore an overview of the various technologies that make up AI, where they have come from, and what AI has evolved into today, and also uncover 10 trends in cybersecurity.

  • Benefits of Multi-Display Desktops

    Sponsored by: Dell India

    Desktops with multi-display can boost your employees productivity and create a more enjoyable and user-friendly experience. Download this resource to learn the top benefits of using multi-display desktops and how your organization can benefit.

  • Cryptocurrencies: How Safe are They?

    Sponsored by: Check Point Software Technologies Ltd.

    Cryptocurrencies are shaping trends in cybercrime. Learn more about the risks and what it takes to understand the different elements of cryptocurrency.

  • How to Hack a Cell Phone

    Sponsored by: Check Point Software Technologies Ltd.

    It's predicted by 2019, mobile malware will amount to one-third of total malware. Listen in on this webcast to learn how to better protect your mobile devices and the motive behind today's hackers.

  • Manage Data Without Silos, Wherever It Resides

    Sponsored by: AWS-Netapp

    Heavily siloed data can be a pebble in the shoe for IT projects that hope to gain value from business data. Add that to the increased managerial complexity of hybrid infrastructure, and that pebble can quickly turn into a bigger problem. Learn how Data Fabric as Service (DFaaS) aims to counter clunky data silos.

  • Check Point Infinity Architecture: The Cybersecurity Architecture of the Future

    Sponsored by: Check Point Software Technologies Ltd.

    In this white paper, find out how cybersecurity architecture can protect the business and IT infrastructure against Gen V mega cyberattacks across all networks, endpoint, cloud and mobile.

  • Mobile Encryption Provider Turns to Cloud Security Services to Secure Customers' Privacy

    Sponsored by: Radware

    When hit with a series of massive multi-vector DDoS attacks, leading encryption provider Myntex experienced severe service interruptions that negatively impacted its customers. In this case study, find out how Myntex adopted cloud security services in order to step up their protection against multi-vector threats.

  • Artificial Intelligence: A Silver Bullet in Cyber Security

    Sponsored by: Check Point Software Technologies Ltd.

    AI is revolutionizing cybersecurity. Learn more in this webcast as speaker, Orli Gan uncovers some important information to know about making security practical with intelligent use of AI.

  • Cloud Automation Services : Learn Where and How

    Sponsored by: IBM

    Identifying where to implement automation is half the battle for IT, and can be especially tricky for companies new to the technology. Tune into this 12-minute webcast to learn how companies like yours are leveraging automation to improve service capabilities, achieve faster time-to-market, and more.

  • CSEA Case Study

    Sponsored by: Radware

    In this case study, learn how CSEA was able to safeguard its digital assets and ensure 100% business continuity for its customers.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.