Research Library

Powered by

Security Research

  • Defending Network Access with Risk Profiling Driven by Mist AI

    Sponsored by: Ampito

    A common cause of security breaches is inadequate network visibility. It’s impossible to mitigate or respond to a breach if you don’t know what’s happening on your network. But Juniper Risk Profiling powered by Mist AI aims to provide deep visibility and policy enforcement at every point of connection. This data sheet tells all.

  • SASE & Zero Trust for Dummies

    Sponsored by: VMware

    SD-WAN is being moved to the edge with SASE to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.

  • Best Practices DNS: The First Principle of Enterprise Security

    Sponsored by: Infoblox

    For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.

  • Secure SD-Wan for the Cloud-First Enterprise Without Compromise

    Sponsored by: Aruba Networks

    As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.

  • Leveraging AI to Automate Vulnerability Management

    Sponsored by: Dell SecureWorks

    Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.

  • Enabling The Next-Generation Security Operation Model

    Sponsored by: Cisco Systems, Inc.

    IDC believes that a new security operation model is needed to address the challenges stemming from the evolving threat landscape. Download the report to learn about a net-gen security operations model.

  • Bringing Enterprise Security To Your Small Business

    Sponsored by: Cisco Umbrella

    Look at this infographic to learn how your small business can get DNS-layer security to protect against enterprise-level threats.

  • Operational Risk Management Accelerator Powered by ServiceNow

    Sponsored by: ServiceNow

    Deloitte and ServiceNow have partnered to create an Operational Risk Accelerator tool to assist organizations in managing their risks. Open this PDF to learn about the Operational Risk Accelerator.

  • Protecting the Human Side of Cybersecurity

    Sponsored by: Forcepoint

    Download this report to get educated on behavioral analytics cybersecurity and Forcepoint’s BA offering.

  • AT&T Managed Threat Detection and Response

    Sponsored by: AT&T Cybersecurity

    Threat detection is fast-growing, but talent is in short supply, leaving organizations to do more with less. As cybercriminals become cleverer, this burden of countering threats falls on the business. Plan your next move - examine this data sheet to explore Managed Threat Detection and Response from AT&T.

  • The Impact of XDR in the Modern SOC

    Sponsored by: Dell SecureWorks

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • The Definitive Buyer's Guide for Managed Threat Detection and Response Services

    Sponsored by: Trustwave

    In this buyer's guide, Trustwave talks about the Managed Detection and Response (MDR) marketplace, compares provider types, and walks through the requirements for effective MDR. Access it here to learn what you should be looking for as you consider the best provider for your specific needs.

  • 3 Threat Vectors Addressed by Zero Trust App Sec

    Sponsored by: Traceable

    Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.

  • Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis

    Sponsored by: Interos

    The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk. Engage this webinar, the Global Resilience Federation Virtual Summit on Security & Third-Party Risk, to explore emerging cyber risk considerations.

  • SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long

    Sponsored by: Interos

    The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.

  • The Golden Tax Department and Emergence of GoldenSpy Malware

    Sponsored by: Trustwave

    To defend your organization against the GoldenSpy threat, download this Trustwave report. Inside, you’ll find details on the attack methodology, suspected entities behind the activity, and protective measures to mitigate risk of being impacted.

  • State of Malware Report 2021

    Sponsored by: Malwarebytes

    As the world was dealing with a global pandemic, cybercriminals ditched some old tactics and focused more on gathering intelligence. Simultaneously, ransomware gangs continued to learn from each other, with successful tactics spreading quickly between them. Download this report to learn more about how cybercrime and cybersecurity changed in 2020.

  • Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies

    Sponsored by: Smarsh

    The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.

  • The Threat Hunt That Uncovered Novel Malware

    Sponsored by: Trustwave

    What do you do when a required software program comes inadvertently bundled with sophisticated malware? Read the full case study here for a breakdown of how one technology vendor identified and remediated the hidden threat with help from the Trustwave SpiderLabs team.

  • The 10 Things Your MDR Service Must Do

    Sponsored by: Rapid7

    Before assessing managed detection and response (MDR) vendors, it is crucial for an organization to evaluate each vendor based on 10 things they should be able to offer. Open up this white paper to uncover what to look for, including deep observation, threat validation and more.

  • The Rise of Cloud-Based Security Analytics and Operations Technologies

    Sponsored by: Rapid7

    Organizations continue to find it difficult managing cyber risk or detecting and responding to cyber incidents. In order to get more insight into this issue, ESG took a deep dive into the impact of using public cloud resources to process and store data, current strategies and more. Open now to uncover key findings from this study.

  • Security Observability: Why Tracing?

    Sponsored by: Traceable

    Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.

  • Protecting Against the Hidden Threats of New Technologies

    Sponsored by: Traceable

    Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.

  • Protecting the Human Side of Cybersecurity

    Sponsored by: Forcepoint

    Download this report to get educated on behavioral analytics cybersecurity and Forcepoint’s BA offering.

  • XDR: Up-Leveling Security Integration

    Sponsored by: Trend Micro

    IDC believes an XDR platform approach can put an SOC-lite or SOC-less enterprise onto a positive trajectory. But what is an XDR platform and how can it level-up your security? Learn more in this blog.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.