Research Library

Powered by

Risk Management Research

  • Magic Quadrant for Intrusion Detection and Prevention Systems

    Sponsored by: Alert Logic

    Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers like Hillstone Networks, Alert Logic, Cisco and more to help you choose the right network security solution to meet your business need.

  • The Future of Security Operations

    Sponsored by: IBM Resilient

    As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.

  • Beyond the General Data Protection Regulation (GDPR) Executive Summary

    Sponsored by: McAfee, Inc.

    As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.

  • 15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations

    Sponsored by: McAfee, Inc.

    The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.

  • It's Time to Take a Proactive Approach to Threat Detection and Prevention

    Sponsored by: IBM

    According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.

  • Worldwide Endpoint Specialized Threat Analysis and Protection Vendor Assessment

    Sponsored by: McAfee, Inc.

    Today's market is flooded with endpoint security technologies, incident response tools, threat intelligence feeds, and behavioral analytics. Take a look at this IDC endpoint threat analysis and protection market report to uncover a quantitative and qualitative assessment of vendors' current and future success in the marketplace.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • How Abtran Secured their Business

    Sponsored by: IBM

    With the expansion of digital and online services, companies must improve their security to stay ahead of cyber threats. Tune into this webcast to uncover a case study and learn how a company in Ireland overcame an influx of threats targeting their data.

  • Vendor Comparison: Automated Malware Analysis

    Sponsored by: McAfee, Inc.

    Automated malware analysis is growing because more security professionals trust the technology to act as their highest fidelity alert. McAfee Take a look at this Forrester Report to see how vendors compare in regard to malware protection.

  • The Security Benefits of DLP

    Sponsored by: InteliSecure

    Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.

  • Security Considerations and Best Practices for Securing Containers

    Sponsored by: Tenable

    Security and risk management leaders must address container security issues around vulnerabilities, visibility, compromise and compliance. Take a look at this Gartner report to uncover security considerations and best practices for securing containers.

  • Magic Quadrant for SIEM

    Sponsored by: IBM

    Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's security information and event management (SIEM) products as well as a market overview.

  • Wimbledon Increases Security to Focus on the Court, not the Cloud

    Sponsored by: IBM

    The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.

  • Vendor Assessment: Print and Document Security

    Sponsored by: HP

    This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.

  • Operationalize Security to Secure your Data Perimeter

    Sponsored by: IBM

    According to this Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their data.

  • Trends in Hybrid Cloud Security: Minding the Gap

    Sponsored by: Aqua Security

    According to an ESG survey of security pros worldwide, 80% of organizations will use containers in their production environments by 2020. Explore this resource to learn about trends, challenges, and future plans of hybrid cloud and container security.

  • SIEM Mid-Market Analysis

    Sponsored by: AlienVault

    SIEM serves 3 important functions: proving compliant practices, formalizing data storage, and initiating breach investigation. Explore this Frost & Sullivan Mid-Market Analysis to uncover how vendors stack up with their SIEM strategies.

  • Integrated Threat Management for Dummies

    Sponsored by: IBM

    Every industry sector has been hit hard by hackers and cybercriminal organizations. Explore this For Dummies e-book to uncover threat management tactics to enhance your security operations and response strategy to protect your enterprise in the era of constant attacks.

  • Security for Containers – 5 Things DevOps Need to Do

    Sponsored by: Aqua Security

    For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.

  • Complete Guide to Enterprise Container Security

    Sponsored by: Aqua Security

    There has been an explosive growth of containers. So, what are the primary threats to container environments? Explore this guide to uncover how to assemble an effective container security program to protect against the looming threats.

  • Frequently Asked Questions: Spectre & Meltdown

    Sponsored by: enSilo

    How is your enterprise protecting your servers, devices, and cloud against malware and vulnerabilities? Explore this Q&A resource to gain insight into the vulnerabilities of Meltdown and Spectre and how to defend against them.

  • Global Application and Network Security Report

    Sponsored by: Radware

    Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.

  • Cybersecurity in Financial Services: A Complex Threat Requiring a Comprehensive Strategy

    Sponsored by: Wombat Security Technologies

    Cybersecurity problems are getting worse overtime, so strategies in place need to constantly be updated. This Osterman Research white paper offers a multi-dimensional view of the complex cybersecurity landscape that financial firms and professionals face.

  • Case Study: Sports Industry Company Overcomes Cybersecurity Issues

    Sponsored by: enSilo

    Take a look at this case study to uncover how a company within the sports industry overcame the issue of falling victim to damaging cyberattacks causing downtime by implementing a security strategy with limited resources.

  • Food & Beverage Security Case Study

    Sponsored by: enSilo

    Companies are beginning to realize that the traditional AV is not enough to protect their data from the ever-changing threat landscape. Explore this case study to gain insight into how a beverage company was able to overcome their issue of preventing ransomware attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.