Research Library

Powered by

All Research

  • Ransomware Predictions for 2021

    Sponsored by: FireEye

    Financially motivated threat actors continue to evolve their ransomware tactics with new innovations that increase the potential damage of these infections. With no sign of slowing, these attacks are disruptive and costly and have a potentially far-reaching and pervasive impact on economies and societies. To learn more, check out this resource.

  • Key Security Lessons Organisations Can Learn From Recent Cloud Data Breaches

    Sponsored by: Redscan

    Among the most significant data breaches to have occurred in recent times, a high proportion can be linked to a failure by organizations to protect cloud infrastructure and services. In this blog post, learn 12 key tips to help minimize cloud risks at your organization.

  • Enterprise Analytics: Ideal Vs. Reality

    Sponsored by: Red Hat

    This white paper lists out five sources of delays in analytics, what the ideal platform for on-prem analytics may look like, and how you can reach those goals in your organization. Open now to take a closer look.

  • Sam Managed Services

    Sponsored by: SHI UK

    Now more than ever it’s crucial that an organization’s software spend is fully aligned to their business goals and provides tangible value. In this paper, learn how SAM managed services can help your organization maximize the value of your IT investments, support digital transformation, and meet IT governance requirements. Open now to get started.

  • Red Hat Video 1

    Sponsored by: Red Hat

    Organizations globally are deploying traditional and cloud-native applications in the hybrid cloud with the help of containers and Kubernetes platforms like Red Hat OpenShift. Find out the top reasons why in this 3-minute video.

  • Mitigation of Strategic Ransomware Threats with Mandiant Managed Defense

    Sponsored by: FireEye

    An effective managed detection and response (MDR) capability can mitigate the risk of threats like ransomware that are strategically deployed by APT groups and assure your C-suite and board of directors that security capabilities are in place. Learn more inside this brief.

  • Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

    Sponsored by: Fortinet, Inc.

    Even though we all want to put 2020 behind us, it’s important to look at the cyber threat landscape from the second half of last year to ensure a more secure future. Download the global threat landscape report to uncover top threats and featured stories from the second half of 2020.

  • Machine Learning For Text Prediction

    Sponsored by: EnterpriseDB

    Machine learning techniques can be used to great effect with and as a part of PostgreSQL. Read this blog post to learn the efficacy of incorporating machine learning techniques for text prediction in a PostgreSQL environment and recommendations for similar projects.

  • Moderna uses the right dose of data to boost discovery

    Sponsored by: Looker

    As Moderna researches key developments in mRNA medical treatments, they do so with a multi-cloud data strategy dedicated to infrastructure optimization, data discovery and integration, and ethical, compliant data usage. Read this white paper to learn why Moderna chose Looker to improve their data analytics and business capabilities.

  • ACI Worldwide Modernizes Software Architecture While Reducing Risk And Lowering Costs With Postgresql

    Sponsored by: EnterpriseDB

    ACI Worldwide chose EnterpriseDB’s BDR for its simplicity, power, and ability to integrate in larger, complex architectures. Read this short blog post to discover how why ACI chose BDR and learn how BDR has become a strong foundation their architecture, with close cooperation between ACI and the BDR team creating a refined and optimized solution.

About the Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences