Research Library

Powered by

White Papers

  • The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)

    Sponsored by: Cato Networks

    Networking and security are slowing down businesses as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).

  • Migrating Enterprise Workloads to the Cloud

    Sponsored by: Oracle Cloud

    In this report, researchers compare the migration capabilities of AWS and Oracle Cloud. Participants reported on price, performance, innovation, and risk as they migrated critical workloads to the cloud using one of the two cloud services. Learn about the key findings of the study in the full research report, ready for download here.

  • Key Considerations to Supporting Work-at-Home Directives for Business Continuity

    Sponsored by: VMware

    In today’s world, business continuity measures are centered around enabling work from home capabilities to protect against productivity losses. Dive inside this guide to learn about the five principles responsible for driving a digitally-savvy employee experience – even if employees are clocking in from home.

  • Enterprise Security: At the Intersection of DNS and Phishing

    Sponsored by: Nominet

    An emerging trend amongst phishing attackers is to target newly registered web domains – which can create significant turmoil in the time it takes to blacklist it. In this white paper, learn more about this emerging threat and discover how security leaders can better combat it.

  • Cyber Confidence: Building a Trustworthy Security Posture

    Sponsored by: Nominet

    As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.

  • Locking Down Private Security

    Sponsored by: Rackspace

    The most common concerns related to cloud migrations are typically related to security. However, cloud users – especially private cloud users – often realize improvements to their security. In this white paper, discover key security challenges and learn how organizations are evolving their defenses to meet the needs of the private cloud.

  • How Do Vulnerabilities Get into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.

  • Cybersecurity for Remote Workers

    Sponsored by: Cisco Umbrella

    As the network changes, so too does attack methodology. Today’s threats often target remote users, and security teams need a way to ensure HQ workers receive the same level of protection as those who work from home. This e-book addresses these challenges and offers a potential fix: DNS-layer security. Read the e-book to learn more.

  • Artificial Intelligence in Insurance: High-Value Use Cases

    Sponsored by: Dataiku

    The growth of data science is driven by a variety of factors, including risk modeling. This white paper explores up-and-coming use cases for data science and machine learning in the insurance space, challenges traditional insurance companies face in implementing these use cases, and trends in how successful companies execute. Download a copy today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.