Research Library

Powered by

Security Spending Research

  • Cyber Confidence: Building a Trustworthy Security Posture

    Sponsored by: Nominet

    As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.

  • Re-thinking Application Security

    Sponsored by: Tala Security

    Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.

  • Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice

    Sponsored by: Tala Security

    When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.

  • Cybersecurity for Remote Workers

    Sponsored by: Cisco Umbrella

    As the network changes, so too does attack methodology. Today’s threats often target remote users, and security teams need a way to ensure HQ workers receive the same level of protection as those who work from home. This e-book addresses these challenges and offers a potential fix: DNS-layer security. Read the e-book to learn more.

  • Ultimate Guide to Multi-factor Authentication

    Sponsored by: Ping Identity Corporation

    When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.

  • Multi-Factor Authentication for Customers

    Sponsored by: Ping Identity Corporation

    Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.

  • Why Critical National Infrastructure (CNI) Providers Need CNI-Ready Security

    Sponsored by: Nominet

    In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.

  • Two Years of Active Cyber Defense Infographic

    Sponsored by: Nominet

    Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.

  • The Hard Truth About Winning Against Cyber Threats

    Sponsored by: Dell SecureWorks

    When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • Digital Resilience in the Multi-Cloud Era

    Sponsored by: Trustwave

    Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    Sponsored by: Thales

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • Securing data across the enterprise while simplifying IT operations

    Sponsored by: Thales

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Unlocking Omni-Channel with Unified Customer Identity

    Sponsored by: Okta

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • Alero Intro

    Sponsored by: CyberArk Software, Inc

    In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.

  • Customer Identity & Access Management (CIAM)

    Sponsored by: Ping Identity Corporation

    Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Sponsored by: Thales

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

  • Secure Access to On-prem Apps & Hybrid Cloud Security

    Sponsored by: Okta

    In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.

  • CA SiteMinder Migration Guide

    Sponsored by: Okta

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Alero Demo

    Sponsored by: CyberArk Software, Inc

    As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.

  • CyberArk Provides Free Subscription to Alero

    Sponsored by: Cyber-Ark Software

    The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.

  • Alero Showcase

    Sponsored by: CyberArk Software, Inc

    In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.

  • Protecting a Nation in the Cloud

    Sponsored by: Trustwave

    In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.

  • Upgrading Existing Security Systems to Agile Quantum-Safe

    Sponsored by: Thales

    Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.

  • Remote Vendor Access

    Sponsored by: CyberArk Software, Inc

    Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.