Research Library

Powered by

Security Research

  • Reducing Cybersecurity Costs & Risk through Automation Technologies

    Sponsored by: Juniper Networks

    According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.

  • Active Directory Management and Security

    Sponsored by: One Identity

    Many organizations expect powerful security from their networking operating systems. This resource examines major security requirements organizations expect and offers Active Directory management and security strategies to augment your current approach.

  • Forcepoint CASB: Visibility and Control of Cloud Applications

    Sponsored by: Forcepoint

    Watch this webcast to learn about the 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they provide. Finally, discover a vendor who may be able to provide you the data governance, audit protection, and more you need.

  • Inside Commvault's Holistic Data Protection Center

    Sponsored by: Commvault

    Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.

  • 2018 Endpoint Security Survey

    Sponsored by: Tanium

    According to the 2018 PwC Global State of Information Security Survey, many companies vulnerable to cyberattacks remain unprepared to deal with digital intrusions. Explore this endpoint security survey to uncover what organizations think about the challenges of incident response, investigation and remediation on endpoints.

  • Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive

    Sponsored by: Splunk

    This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • How to Improve SIEM Systems with Machine Learning

    Sponsored by: LogRhythm, Inc.

    In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.

  • Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.

    Sponsored by: Juniper Networks

    Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Unlock Business Opportunity without Taking Security Risks

    Sponsored by: Juniper Networks

    This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.

  • The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Utilize this 40-page Cisco e-book to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empower analyst with new threat hunting capabilities.

  • The Evolution of RBAC Models to Next-Generation ABAC

    Sponsored by: Axiomatics

    In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.

  • The Rise of Machine Learning in Cybersecurity

    Sponsored by: CrowdStrike

    Today, the latest trend in cybersecurity is artificial intelligence, and specifically machine learning (ML). In this 31-page e-book, gain a detailed definition of ML and how you can successfully apply it to your security initiatives like malware detection.

  • Protect High-Value Assets From Internal Security Risks

    Sponsored by: Hewlett Packard Enterprise

    Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.

  • Future-Proof Your Tactical IAM Projects

    Sponsored by: One Identity

    This e-book provides insight into how to overcome barriers to identity and access management (IAM) success by future-proofing your tactical IAM projects.

  • 6 Steps to Build a Holistic Security Strategy with Microsoft 365

    Sponsored by: Microsoft

    This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.

  • UEBA Use Case: Insider Attack Identification

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.

  • Compromised User and Host Detection Using Behavioral Analytics

    Sponsored by: Hewlett Packard Enterprise

    Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.

  • Holistic Endpoint Security

    Sponsored by: Cylance

    According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.

  • Case Study: Growing Regional Bank Preempts Potential Cyber Attackers

    Sponsored by: Illusive Networks

    How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.

  • Software-defined Secure Networks

    Sponsored by: Juniper Networks

    According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.

  • Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent

    Sponsored by: Juniper Networks

    In this case study learn how, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.

  • Reducing Cybersecurity Costs & Risk through Automation Technologies

    Sponsored by: Juniper Networks

    In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.

  • Cyber Threat Protection Platform

    Sponsored by: NSS Labs

    Enterprise defenses are constantly being challenged by attackers who are morphing tactics and adopting new evasion techniques at a record pace. This resource offers strategies for continuous security validation and cyber risk protection.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.