Research Library

Powered by

Security Policies Research

  • Webcast: Solutions for Privileged Account Resilience

    Sponsored by: One Identity

    Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.

  • Podcast:┬áPrivileged Account Governance and Incident Response

    Sponsored by: One Identity

    A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.

  • Privileged Account Governance and Incident Response

    Sponsored by: One Identity

    A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this webcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.

  • How to Capitalize on the Multi-billion Dollar Market for Managed Security Services

    Sponsored by: IBM

    Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.

  • Aeris and ROAMWORKS: Protecting Cargo from Security Challenges

    Sponsored by: Aeris

    To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.

  • Explore Enterprise Network Firewalls

    Sponsored by: Forcepoint

    There are many options for Enterprise Network Firewalls, which all provide a variety of protection features. Although they all offer a standard set of features, there are often signification differences in each option. In this Gartner Magic Quadrant, explore the strengths and cautions of key vendors in the Enterprise Network Firewalls market.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • The State of Email Security Report 2019

    Sponsored by: Mimecast

    Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.

  • Key Considerations for Deploying IAM and CIAM Software

    Sponsored by: Optiv

    When properly implemented and in compliance with local security policies, identity access management software can serve as the center of any IT security strategy -- but it's important for IT pros to select the right platform for their organization. In this e-guide, explore key considerations for choosing both an IAM and a customer IAM software.

  • The Practical Executive's Guide to Data Loss Prevention

    Sponsored by: Forcepoint

    There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.

  • Proofpoint Essentials for Microsoft Office 365

    Sponsored by: Proofpoint

    Office 365 is Microsoft's cloud-based email and collaboration platform. But you may need more advanced security capabilities beyond what's available. In this solution brief, explore how Proofpoint Essentials for Office 365 can help protect your users from targeted email attacks.

  • MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security

    Sponsored by: IBM

    This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.

  • Top 10 cyber crime stories of 2018

    Sponsored by:

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

  • Cyber Intrusion Services

    Sponsored by: CrowdStrike

    In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.

  • Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes

    Sponsored by: CrowdStrike

    The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.

  • Identity Access Management: Enable Business Growth and Strength Security

    Sponsored by: Optiv

    Breaches, compliance and digital transformation are 3 challenges organizations today are faced with. At the center of today's challenges are compromised identities. In this resource, learn how Optiv can strength your security by implementing a strategic approach to Identity Access Management.

  • 5 Steps For A Successful IAM Deployment

    Sponsored by: Optiv

    Identity Access Management (IAM) is a complex and ever-shifting aspect of every organization's IT structure. Because of this complex nature, deploying an IAM program can be difficult. A successful deployment is often even harder to achieve. In this white paper, explore 5 steps to ensure your IAM deployment is successful.

  • Key Considerations For Implementing an IAM System

    Sponsored by: Onfido

    IT administrators have many features to choose from and requirements to meet when looking for an identity and access management (IAM) tool. In this e-guide, explore other key considerations for selecting and implementing the right IAM system in your organizations.

  • Cybersecurity Heroes Aren't Born... They're Made

    Sponsored by: Proofpoint

    As organizations have become more open to delivering security awareness training, phishing has become a primary focus. But, email is just one of many mediums at cybercriminals' disposal. In this webcast, Gretel Egan discussed best practices and actionable tips for improving the effectiveness of your security awareness training activities.

  • The Insider Threat: Real Defense for Real Businesses

    Sponsored by: Proofpoint

    How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, Kate Burnell, Global Insider Threat Specialist at Dtex Systems and Kurt Wescoe, Chief Architect at Wombat Security discuss how cybersecurity professionals can address the insider threat without shutting down business.

  • Interview: The People Factor: Fight Back Against Phishing

    Sponsored by: Proofpoint

    Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.

  • Deakin Hardens Its Shield With Ivanti

    Sponsored by: Ivanti ANZ

    Deakin University determined the ASD's recommended cybersecurity controls would help them implement the strongest defense against cyberattacks. In this case study, learn how Deakin University was able to address the Top 4 of the ASD Essential 8 strategies after implementing Ivanti's security portfolio.

  • Swinburne University of Technology Meets Its Essential 8 Mandate

    Sponsored by: Ivanti ANZ

    Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.

  • The ASD Essential 8 and Ivanti

    Sponsored by: Ivanti ANZ

    Implementing the ASD Essential 8 effectively helps you achieve a baseline for your cybersecurity strategy. While this sounds straightforward, many companies still struggle to achieve this level of security today. In this white paper, learn about the importance of each control that makes up the Essential 8.

  • Nutanix Flow

    Sponsored by: Nutanix

    Nutanix Flow is a software-defined networking platform for AHV that provides visualization, automation, and security. In this white paper, explore the benefits of Nutanix Flow and how it can help answer the vital question of what VM traffic is actually sent and received in your virtual system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.