Research Library

Powered by

All Research

  • Your Endpoint Security Strategy Needs a Hug

    Sponsored by: Verizon

    Traditional endpoint security has long been a crutch in the fight against hackers, but it just doesn't cut it anymore. Those tools rely on known malware signatures to be effective but they can't defend against zero-day attacks and new ransomware variants. In this blog post, discover 5 areas that you can address to ease your endpoint suffering.

  • Maximizing Security Without Slowing Down the Business

    Sponsored by: Silverfort

    By verifying the true identity of users in response to threat alerts, Silverfort helps security teams ease alert fatigue by reducing the amount of false-positives. Download this solution brief to learn about step-up authentication.

  • Shifting Testing Left: How to Get it Right

    Sponsored by: Sauce Labs

    The success of any organization today hinges on their ability to continuously deliver a flawless digital experience. It makes sense then, that shifting testing left in the development process is becoming common practice. Read this blog post to determine how to make the testing shift left cultural change in your organization.

  • Why Discovery Is Critical to Multi-Cloud Success

    Sponsored by: BMC

    Open this whitepaper to learn how multi-cloud discovery provides insight into your assets and their relationships across your environments, and can help you reduce cloud cost and risk.

  • Threat-Driven Multifactor Authentication (MFA)

    Sponsored by: Silverfort

    In this solution brief, learn how Check Point and Silverfort have partnered to deliver dynamic threat-driven authentication. With this integration, any threat detected by Check Point is leveraged by Silverfort's policy engine to trigger step-up authentication in real-time.

  • Creating Synergies Across Bertelsmann's Worldwide Operations

    Sponsored by: Verizon

    One of Europe's largest media conglomerate, Bertelsmann, is bringing its worldwide operations closer together, and combining capabilities by connecting them onto a seamless global network. In this webcast, learn how Verizon's advanced services, such as SDN and VNS, are delivering scalable bandwidth and increased throughput while reducing costs.

  • The Path to a Thinking Supply Chain

    Sponsored by: IBM

    In this research report from IDC, explore how digital transformation is changing what we know about the modern supply chain. Learn about the key technology trends shaping supply chain transformation, and review your technology options with IBM.

  • Transforming Data Protection with Microsoft Azure and Office 365

    Sponsored by: Veeam Software

    Check out the following resource for an overview of a solution with which you can easily protect both on-premises and cloud-based workloads and simplify business continuity between data center locations and the Microsoft Cloud.

  • Now on Now: Accelerating Security Operations

    Sponsored by: ServiceNow

    Most companies manage security incident response with a manual process. This creates confusion and reduces the visibility an organization has. In this white paper, learn how with the Security Incident Response application of ServiceNow Security Operations, organizations can automate alert processing and accelerate their incident response process.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by:

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.