Research Library

Powered by

Security Software Research

  • 1984 to 2018: The Evolution of the Olympics

    Sponsored by: Radware

    Click inside to learn how the IoT revolution impacted the 2018 PyeongChang Olympic games, as well as the challenges providers and the future host cities of the games will have to address when it comes to protecting internet connected devices and users.

  • Responding Efficiently to Major Data Breaches

    Sponsored by: Nuix

    In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.

  • CW Nordics ezine February 2018

    Sponsored by:

    In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.

  • Forcepoint CASB: Visibility and Control of Cloud Applications

    Sponsored by: Forcepoint

    Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.

  • Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive

    Sponsored by: Splunk

    This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.

  • 6 Steps to Build a Holistic Security Strategy with Microsoft 365

    Sponsored by: Microsoft

    This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.

  • Software-defined Secure Networks

    Sponsored by: Juniper Networks

    According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.

  • The Rebirth of Endpoint Protection

    Sponsored by: NSS Labs

    Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.

  • Fighting Fraud with Unified Data

    Sponsored by: Adyen

    Explore how unified commerce can give retailers a metric to detect potential fraud and note transactions that do not fit a customer's established pattern.

  • Bell Helicopter Enables Attribute-Based Access Control and Authorization

    Sponsored by: Axiomatics

    In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.

  • Modern IAM: Build Trust Without Sacrificing Security

    Sponsored by: CA Technologies

    This white paper outlines how a modern identity and access management system can help build trust between yourself and your users without infringing on their freedom.

  • Unified Threat Management (UTM) Buyer's Guide

    Sponsored by: Fortinet, Inc.

    Click inside to learn the 4 aspects that any good unified threat management (UTM) system has, as well as a buyer's checklist to make sure you have everything you need.

  • CW Benelux February 2018

    Sponsored by:

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • The SIEM Buyer's Guide

    Sponsored by: Splunk

    Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.

  • Leading Consultancy Company Case Study: Providing Single-Sign-On Cloud App Security

    Sponsored by: Forcepoint

    Read this case study to learn how this consultancy company was able to safeguard both customer-facing and employee applications when migrating to the cloud.

  • Manufacturing Company Automates with Enterprise Security SIEM

    Sponsored by: Splunk

    Discover what benefits this manufacturing company gained by adopting a SIEM system to bolster their small security team.

  • A Cloud App Visibility Platform Gave this Airline Peace of Mind

    Sponsored by: Forcepoint

    Read this case study to learn what this geographically dispersed airline gained when they adopted a comprehensive cloud app visibility and control program.

  • Key Benefits of Taking Your SIEM To The Cloud

    Sponsored by: Splunk

    Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.

  • Getting the Board on Board with Application Security

    Sponsored by: WhiteHat Security

    CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.

  • CW Europe – December 2017

    Sponsored by:

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • The Tug of War Between UBA and SIEM

    Sponsored by:

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Protecting the Financial Services Organization

    Sponsored by: Juniper Networks, Inc.

    Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • The Australian Privacy Amendment Explored

    Sponsored by: Rapid7

    Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.