Research Library

Powered by

All Research

  • SIG - SASE For Dummies

    Sponsored by: Cisco

    Secure access service edge (SASE) delivers networking and security via the cloud, giving organizations the ability to securely enable remote users, devices and SaaS apps without inhibiting performance. Read ‘SASE for dummies’ to get a closer look at this technology and learn the key components of a SASE solution.

  • 5 ways to reduce risk with continuous monitoring

    Sponsored by: ServiceNow

    Today, organizations are struggling to manage risk. Manual assessments and siloed tools can’t keep up. Actionable, integrated risk management depends on continuous monitoring. Read about the 5 ways every enterprise can modernize their approach to risk through continuous monitoring and automation.


    Sponsored by: Rubrik

    Ransomware defense has become one of the most critical functions of the modern security team. Watch this episode of Data Security Talks to join Kyle Van Schalkwyk, a Systems Engineer Specialist at Palo Alto Networks, for a discussion around ransomware trends, challenges and defensive strategies.


    Sponsored by: Rubrik

    Kevin Mitnick is often regarded as the world’s most famous hacker. Luckily for today’s organizations, he serves as a consultant and an ‘ethical’ hacker, helping organizations protect themselves against cyberattacks. Watch this exclusive interview with Kevin for a look inside the mind of the world’s most famous hacker.

  • The first Mobile-only Digital bank in Bahrain

    Sponsored by: Hexaware Technologies

    The Middle East needed a fully digital, mobile-only banking platform that could cater to the younger generation, while also remaining dynamic, innovative, and bold in its banking service delivery. Open up this case study to learn more about the first mobile-only digital bank in Bahrain, and see the results realized once it was complete.

  • Accelerating Digital Innovation through Mobiquity’s Innovation Management Services

    Sponsored by: Hexaware Technologies

    A bank wanted to offer customers digital convenience by providing a fully digital banking experience, but to do that they needed to accelerate innovation and develop smart market value proposition. Open up this case study to see which solution the bank implemented to solve their struggles, and learn how you can do the same in your organization.

  • Critical-infrastructure operators welcome government engagement on cybersecurity

    Sponsored by: Mimecast

    Across Australia, utility and data providers are calling for clarity and assistance in shaping and meeting tougher regulations as cybercriminals continue to pummel national infrastructure. In this white paper, explore why the Australian government is getting involved in managing policy uncertainty to help these providers map a way forward.

  • COVID-19 security has been an ongoing challenge for Australian CISOs

    Sponsored by: Mimecast

    In the massive transition to remote work, security executives are dealing with targeted threats, adoption hurdles and overwhelmed users. Criminals have become craftier, and this has caught end users unaware. Download this white paper to learn why CISOs agree that direct user engagement can make the biggest impact on risk.

  • AWS Okta Video

    Sponsored by: AWS Okta

    Access this resource for how to implement centralized SSO for AWS.

  • Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?

    Sponsored by:

    In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences