Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 19 Jul 2017 15:50:14 EDT

Last Build Date: Wed, 19 Jul 2017 15:50:14 EDT

 



Is your IT Security Affecting your Workforce Productivity?

Wed, 05 Apr 2017 24:00:00 EDT

In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more. Published by: Dell and Microsoft



Workspaces of the Future

Wed, 31 Aug 2016 24:00:00 EDT

Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments. Published by: Citrix



The Top Cyber Security Trends in ANZ in 2017

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by: ComputerWeekly.com



Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Tue, 18 Jul 2017 24:00:00 EDT

Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by: ComputerWeekly.com



Is the Endpoint Security Nightmare Ending?

Mon, 17 Jul 2017 24:00:00 EDT

The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be. Published by: SearchSecurity.com



Is your IT Security Affecting your Workforce Productivity?

Fri, 30 Sep 2016 24:00:00 EDT

Click inside to find the major trends and drivers forcing organizations to change or adopt new security procedures in the wake of evolving threats. Published by: Dell and Microsoft



Focus: Disaster recovery planning and virtualisation

Mon, 17 Jul 2017 24:00:00 EDT

We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution. Published by: ComputerWeekly.com



Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

Mon, 17 Jul 2017 24:00:00 EDT

This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. Published by: ComputerWeekly.com



The Top Cyber Security Trends in ASEAN in 2017

Mon, 17 Jul 2017 24:00:00 EDT

For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks. Published by: ComputerWeekly.com



Mobile Apps Risk: Protect without Hindering Productivity

Mon, 10 Jul 2017 24:00:00 EDT

Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps. Published by: Blue Cedar



Mobile Security Risk Mitigation and Tips for Success

Tue, 11 Jul 2017 24:00:00 EDT

Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems. Published by: Blue Cedar



5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

Tue, 11 Jul 2017 24:00:00 EDT

Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches. Published by: Blue Cedar



CW ASEAN – July 2017: Be alert to threats

Thu, 13 Jul 2017 24:00:00 EDT

With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy. Published by: ComputerWeekly.com



CW ANZ – July 2017: Cyber security plan bears fruit

Thu, 13 Jul 2017 24:00:00 EDT

Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape. Published by: ComputerWeekly.com



Password Guidelines to Lower Risk

Thu, 13 Jul 2017 24:00:00 EDT

Our newly-launched guide, Reduce the Risk of Password Breaches, explores what technologies and strategies can make secure password usage easier for end users and improve account protection. Inside this guide, find password guidelines to lower risk, NIST password recommendations, plus additional security methods. Published by: TechTarget



How to Create an Endpoint Protection Plan

Thu, 13 Jul 2017 24:00:00 EDT

A recent TechTarget survey shows that IT and security pros are concerned about undetected threats, false alerts, and data breaches with their current endpoint protection. Explore endpoint security methods and technology options through our Endpoint Protection Planning Guide to create a protection plan that works for you. Published by: TechTarget



Beyond your company boundaries

Wed, 12 Jul 2017 24:00:00 EDT

Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly. Published by: ComputerWeekly.com



European Perceptions, Preparedness and Strategies for IoT Security

Wed, 12 Jul 2017 24:00:00 EDT

Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices. Published by: ComputerWeekly.com



Print security: An imperative in the IoT era

Mon, 10 Jul 2017 24:00:00 EDT

Analyst group Quocirca gives the perspective on the risks and best practices of print security. Published by: ComputerWeekly.com



Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace

Wed, 21 Jun 2017 24:00:00 EDT

Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network Published by: Aruba Networks



Providing Business Continuity for Mission-Critical Applications

Fri, 07 Jul 2017 24:00:00 EDT

Going without a disaster recovery plan leaves your data center vulnerable. In this white paper, learn about how to create a plan to get you back on your feet after an outage, as well as a system that can be your DR "umbrella". Published by: DataCore Software Corporation



Protecting and Enabling the Network

Fri, 07 Jul 2017 24:00:00 EDT

According to a recent IDG Research Services poll among IT leaders, security, network complexity, and growing traffic volumes are the top factors affecting enterprise network strategies. Find out how they're planning to tackle these issues with threat intelligence, private clouds, unified network security, and more. Published by: Juniper Networks, Inc.



Security Monitoring Solved: An Expert Path to Clairvoyant Defense

Wed, 05 Jul 2017 24:00:00 EDT

Security monitoring is essential for staying ahead of the threat landscape. In this exclusive webinar featuring Forrester Research, uncover the criteria for evaluating vendors, the benefits of integrated security platforms and much more. Published by: IBM



The Next Security Frontier: Automation, Things and Intelligent Machines

Tue, 27 Jun 2017 08:15:00 EDT

How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for. Published by: IBM



Deploying Java EE apps in cloud and container environments

Wed, 05 Jul 2017 24:00:00 EDT

Competitive companies are turning to DevOps, microservices, and containers to get the most from their Java apps. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities. Published by: Red Hat



What can CIOs do about the skills shortage in ASEAN?

Tue, 04 Jul 2017 24:00:00 EDT

In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software. Published by: ComputerWeekly.com



MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate

Fri, 30 Jun 2017 24:00:00 EDT

An issue looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service and cloud platforms. Published by: MicroScope



10 Reasons Your Cyber Security Strategy Needs A Checkup

Tue, 27 Jun 2017 24:00:00 EDT

Click into this infographic to learn the 10 reasons your security might need a checkup. Published by: Rackspace



Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

Tue, 27 Jun 2017 24:00:00 EDT

We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup. Published by: ComputerWeekly.com



Modernizing Data Center Protection

Thu, 22 Jun 2017 24:00:00 EDT

In this expert-guide by our Senior Analyst Jason Buffington, find out how we've gotten to the point we're at in data center DR, and where it's going in the future. Published by: Dell EMC and Intel®



Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?

Mon, 26 Jun 2017 24:00:00 EDT

Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges. Published by: ComputerWeekly.com



IoT & the Enterprise: Exploring Opportunities and Challenges in Asia

Mon, 26 Jun 2017 24:00:00 EDT

Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments. Published by: ComputerWeekly.com



SAM: Not just about compliance

Fri, 23 Jun 2017 24:00:00 EDT

Software Asset Management (SAM) has become even more important today. With so many places that our applications are in use – across numerous physical devices and in the cloud – it is increasingly difficult to manage their licenses and avoid heavy fines. Access this e-Guide for more information on modern SAM tools. Published by: Flexera Software



Public Employees' Retirement System Increases Network Visibility and Streamlines Security

Fri, 23 Jun 2017 24:00:00 EDT

Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more. Published by: Gigamon



Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting

Fri, 23 Jun 2017 24:00:00 EDT

Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more. Published by: Gigamon



See What Matters: Closing Gaps in Network Visibility

Thu, 22 Jun 2017 24:00:00 EDT

Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security. Published by: Gigamon



Troubling Trends in Network Security

Thu, 22 Jun 2017 24:00:00 EDT

Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics. Published by: Gigamon



Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

Tue, 06 Jun 2017 24:00:00 EDT

In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2. Published by: Forcepoint



Evaluating Mobility Management Solutions for Common Use Cases

Wed, 21 Jun 2017 24:00:00 EDT

Digital workspaces are the next logical step in enhancing productivity and security, and providing users with the seamless experiences they need – whether they are travelling, remote, or roaming users. Download this webcast to discover what a digital workspace is comprised of, use cases, and how it can benefit your organization. Published by: Citrix



Overcoming the Human Factor with Visibility-Centric Security

Wed, 21 Jun 2017 24:00:00 EDT

Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity. Published by: Gigamon



Is Your IT Security Affecting Your Workforce Productivity?

Tue, 20 Jun 2017 24:00:00 EDT

Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security. Published by: Dell India



Pervasive Visibility Platform – A New Approach to Network Monitoring

Fri, 31 Mar 2017 24:00:00 EDT

Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more. Published by: Gigamon



Top 5 Reasons to Choose Dell EMC For Data Protection

Tue, 20 Jun 2017 24:00:00 EDT

Discover 5 ways in which Dell EMC's data protections suite can give your business the enterprise-grade data protection you need to accelerate your digital transformation. Published by: Dell EMC Intel®



Top 5 Reasons This Data Protection Suite Stands Out

Mon, 19 Jun 2017 24:00:00 EDT

Go inside this white paper to learn about a family of data protection software designed to work in harmony to keep your information safe. Published by: Dell EMC Intel®



Why Businesses Need a More Enlightened Approach to Phishing Attacks

Wed, 14 Jun 2017 24:00:00 EDT

Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link. Published by: PhishMe



Is Your Lack of Mobile Security Affecting Your Workforce Productivity?

Mon, 31 Oct 2016 24:00:00 EDT

In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification. Published by: Dell India



Power of Proxy in Security

Tue, 06 Jun 2017 24:00:00 EDT

With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more. Published by: Symantec & Blue Coat Systems



Your expert guide to the highlights of Infosecurity Europe 2017

Mon, 19 Jun 2017 24:00:00 EDT

Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London. Published by: ComputerWeekly.com



Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

Mon, 19 Jun 2017 24:00:00 EDT

Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps. Published by: Gigamon



What can CIOs do about the IT skills shortage in ANZ?

Mon, 19 Jun 2017 24:00:00 EDT

CIOs in Australia and New Zealand, like their counterparts in other parts of the world, have been facing shortages in IT talent that have become more acute in recent years. In this e-guide, read more about IT talent issues in Oceania. Published by: ComputerWeekly.com