Research Library

Powered by

All Research Sponsored By:Xcitium


    In cybersecurity, there are 3 types of files: the good, the bad and the unknown. Approaches such as antivirus, blacklisting and whitelisting can handle the known good and bad files, but what about the unknown files? Read this e-book to explore how auto-containment technology can save your business from hidden threats.

  • School district relies on Comodo’s security technology to contain and defeat unwanted malware

    Ensuring the protection of endpoint technology usage – from desktops to laptops, smart phones to tablets – from the threat of malware and other malicious attacks has become paramount. Access this case study to learn how the Perry Community School District partnered with Xcitium for its ESM platform and realized 5 key benefits.

  • School district needs all-in-one security with remote access capabilities

    Access this case study to learn how the Rosedale Union School District, along with Xcitium, makes its distance learning environment secure and flexible.

  • Ransomware Lessons from REvil’s Return

    After the SolarWinds attacks exposed a giant backdoor into the networks of major organizations and government agencies, REvil launched a similar attack. Now, we have to answer the question of how businesses can manage to protect themselves without wasting time and resources to review of every file they download. Read this white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.