Research Library

Powered by

All Research

  • DDoS Mitigation and SSL Attack Protection Case Study

    Sponsored by: Radware

    In this case study, find out how one financial services company tag-teamed network security by adopting an on-premise DDoS appliance and SSL attack mitigation software to overcome the increased rate of cyberattacks assailing their organization.

  • The End of the Beginning: Unleashing the Transformational Power of GDPR

    Sponsored by: IBM

    Find out how executives assessed the GDPR compliance in a survey of insightful responses about security, risks, and readiness.

  • DDoS Network Protection: TeraGo Case Study

    Sponsored by: Radware

    Find out how one IP network provider adopted market-leading DDoS detection and mitigation to protect their own infrastructure as well as their customers across its telco, data center, and cloud hosting environments.

  • How To Succeed in Data Loss Prevention (DLP) Projects

    Sponsored by: Docauthority

    Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.

  • Deliveroo Uses Business Intelligence to Transport Meals Faster

    Sponsored by: Looker

    In a market that is expected to reach $46B by 2021, Deliveroo's online food ordering and delivery company went from startup to star insights. In this case study, discover how Deliveroo went from minimal BI capabilities to providing confidence companywide with valuable insights.

  • Analytical Maturity

    Sponsored by: Looker

    Now, more than ever, is the time to develop a mature analytics ecosystem. Download this white paper to learn the keys to development – including the 5 pillars of analytics, key questions to ask, analytics training, and more.

  • ERP: Choosing and Implementing the Right System for your Business

    Sponsored by: Oracle NetSuite

    At some point, you will most likely need to update or install new ERP software. Choosing the wrong platform could significantly hinder growth and negatively affect customer relations. Utilize this fill-in-the-blank guide to help ensure you purchase the right enterprise platform for your business the first time around.

  • Going Mobile: The Emerging Threat Landscape

    Sponsored by: Check Point Software Technologies Ltd.

    For hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. Listen in on this webcast to learn about the latest modes of attack used by hackers to breach mobile devices and how businesses are staying protected against these 5th generation attacks.

  • Embedded Analytics in Action

    Sponsored by: Looker

    There are some common dilemmas when trying to implement embedded analytics. Explore these common issues and discover 3 case studies on successful embedded analytics deployment.

  • Enabling Leaders Navigate Business Challenges

    Sponsored by: Oracle NetSuite

    In this Frost and Sullivan report, learn about the competitive business environment in the digital era, and why demands are focused on innovation for improved customer engagement.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.