Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
access  cloud  data protection  data  discover  learn  management  mobile  protection  published  secure  security  storage 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Mon, 05 Dec 2016 16:35:13 EST

Last Build Date: Mon, 05 Dec 2016 16:35:13 EST

 



How To Plan For Disaster Recovery

Mon, 05 Dec 2016 24:00:00 EST

This e-Book outlines 5 key questions for disaster recovery scenarios and explains how to recover from and prevent them. The e-Book then dives deeper into detail around the 3 most common DR scenarios. Published by: LogicNow



Container Security: How to Secure Enterprise Container Stacks

Fri, 02 Dec 2016 24:00:00 EST

Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure. Published by: NeuVector



Choosing The Right Disaster Recovery Solution

Mon, 05 Dec 2016 24:00:00 EST

This e-Book will provide you with insight on how to setup and manage your DR plan. It explains how to determine which data is critical, how to identify your recovery objects, and how to determine the best backup and recovery methods and solutions for your enterprise. Published by: LogicNow



CW Europe: December 2016 - February 2017

Mon, 05 Dec 2016 24:00:00 EST

Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks. Published by: ComputerWeekly.com



Case Study: The Yield Transforms Australian Agriculture with IoT

Tue, 15 Nov 2016 24:00:00 EST

Tune into this case study as The Yield demonstrates how they transform agriculture decision-making by delivering the data they garner with IoT strategies to industry regulators for fast and informed decisions. Discover how to leverage IoT in the field to turn usable information into real-time actionable insight. Published by: Microsoft



A Powerful Next-Gen Antivirus Solution

Wed, 30 Nov 2016 24:00:00 EST

Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps. Published by: Carbon Black



Three Golden Rules for Safe and Sound Endpoints

Wed, 30 Nov 2016 24:00:00 EST

Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements. Published by: IBM



Reducing Attack Surface: SANS’ Second Survey on Continuous Monitoring Programs

Wed, 30 Nov 2016 24:00:00 EST

Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one. Published by: IBM



The Cyber Threat Guide

Wed, 30 Nov 2016 24:00:00 EST

This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them. Published by: LogicNow



A Quick Guide for DBAs: Oracle, the Cloud and All-Flash Storage

Fri, 02 Dec 2016 24:00:00 EST

Learn how all-flash storage is helping database administrators (DBAs) keep their Oracle databases on-premises as opposed to taking the risk of the public cloud. Access now to learn how you can provide your database with predictable transaction rates, eliminate the need for data migrations, reduce total cost with extend product lifecycles, and more. Published by: Pure Storage



APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience

Mon, 03 Oct 2016 24:00:00 EDT

Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data. Published by: TIBCO Software Inc.



The myth of email as proof of communication

Fri, 02 Dec 2016 24:00:00 EST

Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options. Published by: ComputerWeekly.com



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 17 Nov 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 01 Dec 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Download this resource as leaders from the nation's leading health systems demonstrate how application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



Reasonable Security Best Practices: Learning From Notable Data Breaches

Mon, 28 Nov 2016 24:00:00 EST

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition? Published by: Global Knowledge



5 Questions to Ask Data Protection Vendors

Wed, 30 Nov 2016 24:00:00 EST

Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors. Published by: Commvault



Southern California Edison Protects Workers and Customers with EHS Management

Wed, 31 Dec 2014 24:00:00 EST

Discover how deploying one Environment, Health, and Safety (EHS) Management application will help any organization streamline management of operational risks and environmental compliance processes. Read on to learn how this EHS app streamlines incident management and automates information screening. Published by: SAP



Trends in Mobile User Authentication

Thu, 01 Dec 2016 24:00:00 EST

Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more. Published by: HID



How To Build A Strong Data Foundation With A Scalable Relational Database

Thu, 01 Dec 2016 24:00:00 EST

Investigate the resources provided in this flipbook to discover more about a relational database program that can provide a secure environment for real-time analytics that you can scale to fit your business needs. Published by: IBM



Dedicated to Information Security: The High-Stakes Role of the CISO

Thu, 01 Dec 2016 24:00:00 EST

Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead. Published by: SearchSecurity.com



Important Modern Trends in Digital Banking

Wed, 30 Nov 2016 24:00:00 EST

Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more. Published by: HID



The Threat Lifecycle Management Framework

Wed, 30 Nov 2016 24:00:00 EST

You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.) Published by: LogRhythm, Inc.



CW ANZ - December 2016

Wed, 30 Nov 2016 24:00:00 EST

In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads. Published by: SearchDataCenter.com



8 Decisive Factors For A Successful Employee Engagement Program

Fri, 29 Apr 2016 24:00:00 EDT

Employee engagement programs help both the employee and the organization, and improve the overall chance of success. Access this study to uncover which 8 factors determine an employee engagement program's success. Published by: IBM



Get Control Over Your Cloud Security

Wed, 30 Nov 2016 24:00:00 EST

You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure. Published by: LogRhythm, Inc.



Comparing Data Protection and Information Management Vendors

Mon, 31 Oct 2016 24:00:00 EDT

Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more. Published by: Commvault



How Many Network Connected Medical Devices Does Your Organization Have?

Wed, 05 Oct 2016 24:00:00 EDT

IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them. Published by: Zingbox



Important Considerations for Comparing Data Protection Vendors

Mon, 31 Oct 2016 24:00:00 EDT

What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision. Published by: Commvault



Top Reasons Why Customers Deploy Flash Storage

Sat, 30 Apr 2016 24:00:00 EDT

Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology. Published by: TechData - EMC



A Network Security View Of Docker Containers

Mon, 31 Oct 2016 24:00:00 EDT

Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall. Published by: NeuVector



Banking Security in Today's Mobile World

Fri, 30 Sep 2016 24:00:00 EDT

This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now. Published by: HID



Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance

Wed, 30 Nov 2016 24:00:00 EST

Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more. Published by: Riverbed Technology, Inc.



What to Look for in Incident Response Management Tools

Tue, 29 Nov 2016 24:00:00 EST

Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital. Published by: SearchSecurity.com



Facts About the Cloud

Tue, 29 Nov 2016 24:00:00 EST

By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology. Published by: Sage Live



Give Them Access. NOT a VPN

Tue, 29 Nov 2016 24:00:00 EST

Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk. Published by: Bomgar Corp.



Building the Business Case for Strong Authentication

Fri, 07 Oct 2016 24:00:00 EDT

With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience. Published by: HID



Top Reasons Why Customers Deploy Hybrid Storage

Sat, 30 Apr 2016 24:00:00 EDT

Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology. Published by: TechData - EMC



Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition

Tue, 22 Nov 2016 24:00:00 EST

Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms. Published by: Riverbed Technology, Inc.



Guide & Checklist to Container Security

Mon, 31 Oct 2016 24:00:00 EDT

This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production. Published by: NeuVector



Definitive Guide to Cloud Access Security Brokers

Mon, 28 Nov 2016 24:00:00 EST

In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them. Published by: BitGlass



BYOD and Mobile Security Report

Mon, 28 Nov 2016 24:00:00 EST

Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age. Published by: BitGlass



Securing BYOD without MDM

Mon, 28 Nov 2016 24:00:00 EST

Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents. Published by: BitGlass



The Evolution of Cloud Security: Perception vs. Reality

Mon, 28 Nov 2016 24:00:00 EST

This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more. Published by: BitGlass



How Midmarket IT Leaders Can Improve Their Data Security

Tue, 13 Sep 2016 24:00:00 EDT

This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures. Published by: Arctic Wolf Networks, Inc.



A CIO’s Guide for Reducing Security Anxiety

Mon, 31 Oct 2016 24:00:00 EDT

Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board. Published by: BitSight



Threat management: Essential guide

Fri, 25 Nov 2016 24:00:00 EST

Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management. Published by: ComputerWeekly.com



EU data protection: Essential guide

Thu, 24 Nov 2016 24:00:00 EST

The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows. Published by: ComputerWeekly.com



The Future of Security: Advanced Security Analytics

Tue, 22 Nov 2016 24:00:00 EST

As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds. Published by: LogRhythm, Inc.



Marisol Enables Secure BYOD

Wed, 23 Nov 2016 24:00:00 EST

Learn how Marisol International enabled secure access to corporate data form any mobile device without the need for software agents. Discover how they can now access rich visibility and analytics, enabled selective wipe of corporate data, and more. Published by: BitGlass



How MDM Software Exposes Your Personal Data

Wed, 23 Nov 2016 24:00:00 EST

Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it. Published by: BitGlass