Research Library

Powered by

Data Security Research

  • Authentication-as-a-Service Improved

    Sponsored by: Entrust, Inc.

    How are you securing your enterprise and dealing with authentication protocols? This resource offers an authentication-as-a-service strategy to aid your enterprise in improving its IAM security approach.

  • Threat Territory

    Sponsored by: RSA Conference

    This resource offers insight into the ever-growing internet of threats through expert tips and startling facts to get you up to speed with the damaging threats you need to look out for and system vulnerabilities you could be missing.

  • Journey to GDPR Readiness

    Sponsored by: IBM

    The GDPR represents a unique opportunity to help strengthen privacy compliance and preserve customer trust, while reducing risk exposure and creating a competitive advantage. Uncover one company's journey to GDPR readiness to help your organization prepare.

  • 10 benefits of data mining and predictive analytics

    Sponsored by: MicroStrategy Incorporated

    Learn how you can extend the benefits of data science, machine learning, and predictive analytics, and the challenges that companies are facing with these plans.

  • Hacker Intelligence Initiative

    Sponsored by: Imperva

    The amount of unstructured data organizations create and the number of employees that need to access it are growing exponentially. Take a look at this hacker intelligence initiative report to gain insight into access controls and how to protect your organization against attacks targeting sensitive data.

  • 2018 Cybersecurity Report

    Sponsored by: Cisco Systems, Inc.

    Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.

  • DDoS Response Playbook

    Sponsored by: Imperva

    DDoS attacks have become a fact of life for any business with a web presence. This guide reveals how to plan and execute a DDoS response plan and outlines pragmatic steps and best practices for choosing and setting up the right mitigation strategy for your organization.

  • Governing Risk Data Aggregation and Risk Reporting

    Sponsored by: IBM

    Explore how new technology can help you kill 2 birds with 1 stone: Remain compliant with regulations such as GDPR, and still gain value out of your data.

  • BYOD and Device Risks within Healthcare

    Sponsored by: SyncDog

    According to Google, 87% of healthcare professionals are using mobile devices within the industry. This white paper reveals how BYOD is fueling the fire of endpoint device risk in healthcare.

  • Striking Security Gold: A Decade of Cybersecurity Insights

    Sponsored by: RSA Conference

    How has the discussion around the state of cybersecurity changed over time?This Cyentia Institute report offers a critical 10-year timeline in cybersecurity and addresses all angles of the industry conversation, from the growing hype surrounding cryptocurrency to the declining use of big data.

  • Empower and Protect Your Organization With an End-to-End Approach to IoT Security

    Sponsored by: VMware Pulse

    McKinsey predicts the annual economic impact of the IoT could exceed $11 trillion by 2025. This white paper reveals an end-to-end approach to protecting your organization within the age of IoT.

  • Secure Managed File Transfer: Ultimate Buyer's Guide

    Sponsored by: HelpSystems

    Files contain a multitude of sensitive information and therefore data transfers of these files need to be protected. Take a look at this buyer's guide to learn how to effectively secure file transfers by utilizing a managed file transfer (MFT) product.

  • Data Integration Reaches Inflection Point: Survey Results

    Sponsored by: IBM

    This report explores the results of a BizTechInsights survey that polled 369 IT professionals on the challenges of data integration. Discover the report's key findings and learn about

  • Optimizing Endpoint Security for the Enterprise

    Sponsored by: ConvergeOne

    Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.

  • Your Guide to MFA

    Sponsored by: HYPR

    Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.

  • Extending the Value of Microsoft Dynamics CRM with Data Integration

    Sponsored by: SnapLogic UK Ltd

    Find out how to simplify data integration in multi-vendor, hybrid IT environments so that you can break down silos, extend the value of apps like Microsoft Dynamics CRM, and generate accessible insights faster.

  • Protecting Your Distributed Data With The Cloud

    Sponsored by: Druva Software

    Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Imperva

    Hacked customer data can erase millions in profits, and unnecessary privacy abuses can bring unwanted scrutiny and regulatory fines while damaging reputations. Take a look at this Forrester report to uncover the future of data security and privacy.

  • Absolute Endpoint Visibility and Control Platform: ROI and Business Benefits

    Sponsored by: Absolute

    How is your enterprise protecting its endpoints? Explore this Forrester report to learn about the potential ROI, benefits, costs, and risks of Absolute's endpoint visibility and control platform.

  • Navigating the General Data Protection Regulation Mini Guide

    Sponsored by: McAfee, Inc.

    As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

  • Equifax Exposed Two Massive Systemic Risks

    Sponsored by: Flexera Software

    In today's digital economy, companies use individuals' data without always properly protecting this sensitive information. Explore this report to gain insight into 2 issues that lead to the Equifax breach and uncover how to protect sensitive data.

  • Data Classification Services and Keeping Cloud Data Secure

    Sponsored by: Data443

    In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.

  • GDPR Looms with Organizations Still Unprepared

    Sponsored by: Data443

    GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.

  • Machine Learning Raises Security Teams to the Next Level

    Sponsored by: McAfee, Inc.

    While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious.

  • Cyber Resilience in the Modern SOC: Why Detection and Prevention is Not Enough

    Sponsored by: IBM Resilient

    Organizations are failing at early breach detection, with more than 80% of breaches undetected by the breached organization, according to Gartner. This resource explores cyber resilience in the modern SOC and reveals why detection and prevention is no longer enough for effective security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.