Research Library

Powered by

All Research

  • Understanding the Limitations of Microsoft Office 365 Security

    Sponsored by: Forcepoint

    Tune into this 30-minute webcast where CEO and founder, Mike Osterman, will discuss the key findings of an Office 365 study and organizations' priorities around email security.

  • A Computer Weekly buyer's guide to software-defined networking in the enterprise

    Sponsored by:

    The trends of software-defined networking have implications for many other areas of a business. In this 15-page buyer's guide, Computer Weekly looks at campus LAN design, the differences between SDN and DevOps, and how to connect to a container-based architecture.

  • Cloud Data Protection and Backup Center

    Sponsored by: Commvault

    This custom website is designed to help you establish an agile, secure, and reliable cloud environment for apps and data. Click here to access any of the 11 resources curated to assist your cloud initiatives.

  • Extending the Value of HCI with an Ecosystem of Solutions, Services, and Support

    Sponsored by: Dell EMC and Nutanix

    This ESG report will help you ensure your entire HCI stack is validated to handle the varying demands of your apps. Read on for the importance of purpose-built HCI hardware and to learn about a hyper-converged infrastructure that takes these considerations into account.

  • Helping Noble Group to Secure its Global Network

    Sponsored by: British Telecommunications PLC

    The Noble Group, a Hong Kong-based global banking company needed to maintain their highest standards of network security. Since their whole business revolved around real-time, online global trading, it was crucial to have a secure and dependable network. Read on to learn about the security services they implemented.

  • How Cambridge University Press Automates SAP Workloads on AWS

    Sponsored by: AWS - Lemongrass

    In this webinar, Lemongrass will demonstrate the business opportunities presented by automating SAP workloads on AWS. They will also show you how they helped Cambridge University Press achieve the first stage of automation and the benefits that it's delivering for them.

  • Protecting People: A Quarterly Analysis of Highly Targeted Attacks

    Sponsored by: Proofpoint, Inc.

    Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.

  • Cloud Security Foundations

    Sponsored by: Forcepoint

    In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.

  • Mastering Policy Setting and Control in the Cloud

    Sponsored by: Forcepoint

    Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.

  • Reference Architecture: Dell EMC Ready System for VDI on XC Series

    Sponsored by: Dell EMC and Nutanix

    This 105-page reference architecture covers in comprehensive detail how to integrate Dell EMC XC Series Hyper-converged Appliances and Citrix XenDesktop software for VDI environments. Download your copy to discover the operational benefits of integrating the two, as well as instructions for integration.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.