Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
blue coat  cloud  coat systems  data  discover  learn  published symantec  published  ransomware  security  symantec blue  systems 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 24 Feb 2017 16:00:16 EST

Last Build Date: Fri, 24 Feb 2017 16:00:16 EST

 



8 Ways to Protect Your Network Against Ransomware

Fri, 30 Dec 2016 24:00:00 EST

This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals. Published by: Dell, Inc.



Seeking secure Wi-Fi

Fri, 24 Feb 2017 24:00:00 EST

An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending Published by: MicroScope



Expert Viewpoints on Access Management and Federation

Fri, 24 Feb 2017 24:00:00 EST

Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Published by: IBM



Protect Your Critical Assets with Identity Governance and Intelligence

Fri, 24 Feb 2017 24:00:00 EST

Learn how integrating policy and governance controls with identity management processes would help your organization undersand, control, and make better business decisions related to access and risk. Published by: IBM



A New Dawn For Data Privacy

Fri, 30 Dec 2016 24:00:00 EST

In this white paper, learn the benefits of embracing the GDPR with a good data governance strategy, which can help you not only avoid sticky legal situations, but keep your own data private as well. Published by: Symantec & Blue Coat Systems



Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place

Fri, 24 Feb 2017 24:00:00 EST

Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected. Published by: Dell SonicWALL



Omnichannel Authentication: Balancing Humanity and Technology

Fri, 24 Feb 2017 24:00:00 EST

Learn how to make authentication processes less cumbersome for your customers with technology for secure, simple engagement. Published by: NICE Systems, Inc



Eight Best Practices To Prevent Your Data From Being Held Hostage

Fri, 24 Feb 2017 24:00:00 EST

Discover these 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture. Published by: Dell SonicWALL



Office 365: Should You Allow Traffic to Bypass the Proxy?

Fri, 24 Feb 2017 24:00:00 EST

When migrating to cloud-based Office 365 deployments, organizations are faced with the decision for its traffic to bypass the proxy or not. Learn the negatives of allowing Office 365 traffic to bypass the proxy and what to do about it. Published by: Symantec & Blue Coat Systems



2016 Mobile Security & Business Transformation Study

Fri, 24 Feb 2017 24:00:00 EST

Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility. Published by: IBM MaaS360



What To Do When 'It Should Never Happen' Happens: Guide to Writing a Disaster Recovery Plan

Fri, 24 Feb 2017 24:00:00 EST

Discover how to establish a well-written DRP with 9 essential steps that ensure you reduce financial losses, minimize downtime, and keep customers on your side. Read on to assess the effectiveness of your current DRP (if you have one), and benchmark your current strategies against those illustrated here. Published by: Macquarie Cloud Services



Get proactive about Incident ResponseWith the Blue Coat Advanced Threat Assessment

Fri, 24 Feb 2017 24:00:00 EST

Uncover the reasons behind how today's threats can bypass traditional security measures and what an organization can do to respond to modern, seemingly undetectable malware and attacks. Published by: Symantec & Blue Coat Systems



Risk Assessment: The Roles Vendors and Frameworks Play

Wed, 15 Feb 2017 24:00:00 EST

Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework. Published by: BitSight



How Data Privacy Laws Impact Cloud Adoption In The UK

Sat, 31 Dec 2016 24:00:00 EST

Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law. Published by: Symantec & Blue Coat Systems



Security Rating Scores for Third-Party Vendors Catching On

Wed, 15 Feb 2017 24:00:00 EST

In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry. Published by: BitSight



Keep Systems Secure with Best Practices – and Best User Experience – in Mind

Thu, 23 Feb 2017 24:00:00 EST

Gain a better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough, about 3 MMFA use-case scenarios, what market factors are driving MMFA adoption, and more. Published by: IBM



Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

Fri, 17 Feb 2017 24:00:00 EST

If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan. Published by: ModoModo



Affordability and Reliability Are The Two Key Phrases When It Comes to Disaster Recovery Plans

Wed, 22 Feb 2017 24:00:00 EST

Discover how consistent and thorough testing of your DR plan can prevent any major outages from happening in this expert guide. Read on to find out some quick and easy ways to put together a DR initiative without breaking the bank. Published by: Iron Mountain



Sonicwall 2017 Annual Threat Report

Thu, 23 Feb 2017 24:00:00 EST

The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape. Published by: Dell SonicWALL



Perception vs. Reality: The Apps You Don't Know You're Using Are Vulnerable

Wed, 22 Feb 2017 24:00:00 EST

Tackle shadow IT in this report by looking into the perceptions vs. the reality of how organizations really use cloud applications. Discover the massive backdoor they can often leave in your security policy, and what you can do to mitigate the risk. Published by: Symantec & Blue Coat Systems



HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD

Wed, 22 Feb 2017 24:00:00 EST

Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence. Published by: Symantec & Blue Coat Systems



6 Questions Answered About Safe Harbor Getting Struck Down

Sat, 31 Dec 2016 24:00:00 EST

This infographic quickly answers 6 common questions asked about the repercussions of Safe Harbor being struck down including the origins of the ruling, who the ruling applies to, how to comply with cloud systems, and more. Published by: Symantec & Blue Coat Systems



Better Collaboration Tools to Satisfy Both Employees and IT

Wed, 22 Feb 2017 24:00:00 EST

There's been an ongoing stigma associated with blocking collaboration tools due to security risks. Access this resource now to gain insight into how you can reinvent IT to enable effective enterprise collaboration and drive productivity without compromising. Published by: Box



Complying with the European General Data Protection Regulation

Thu, 23 Feb 2017 24:00:00 EST

Access this white paper now to learn what GDPR compliance means to your organization, what steps you must take to remain compliant, key GDPR provisions, and more. Published by: Quest



10 Tips for Protecting Data in the Cloud

Wed, 22 Feb 2017 24:00:00 EST

Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use. Published by: Symantec & Blue Coat Systems



Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats

Wed, 22 Feb 2017 24:00:00 EST

As the threat landscape evolves, you need to be able to change with it. In this expert guide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan. Published by: Iron Mountain



Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation

Thu, 31 Dec 2015 24:00:00 EST

This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting. Published by: Matrix42



Top 5 Questions Answered on How to Best Protect Your Data in the Cloud

Tue, 21 Feb 2017 24:00:00 EST

Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues. Published by: Symantec & Blue Coat Systems



New Strategies For Backup and Disaster Recovery

Tue, 21 Feb 2017 24:00:00 EST

In this expert-eguide, learn steps to keeping your data more secure like focusing on the 3 major techniques used in data backup, how to quickly recover from a ransomware attack, why using a recovery-in-place technique could be beneficial, and more. Published by: Iron Mountain



A Look at How Data Privacy Laws Impact Cloud Expansion in Germany

Tue, 21 Feb 2017 24:00:00 EST

Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant. Published by: Symantec & Blue Coat Systems



Empowering the Mobile Workforce with MDM and EMM

Tue, 31 May 2016 24:00:00 EDT

This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more. Published by: Snow Software



Taking a Proactive Approach to Addressing Ransomware

Wed, 08 Feb 2017 24:00:00 EST

Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations. Published by: AttackIQ



11 Steps IT Needs to Take When Adopting Cloud Apps and Services

Mon, 20 Feb 2017 24:00:00 EST

Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization. Published by: Symantec & Blue Coat Systems



Enabling Secure Collaboration across Microsoft Tools and Devices

Mon, 20 Feb 2017 24:00:00 EST

This paper explores how to leverage a collaboration platform in conjunction with popular Microsoft tools like Office 365, Windows, Intune, and Outlook. Discover how to manage content securely and easily across mobile and desktop devices to empower users to sync, share, edit, and collaborate with up-to-date versions of all of your important files. Published by: Box



Experts Debate National Cybersecurity Policy Suggestions At RSAC 2017

Mon, 20 Feb 2017 24:00:00 EST

What exactly are President Trump's potential policies around encryption and international data flow and how might we all be affected? Download and find out the facts direct from the show floor. Published by: Absolute



What's The Best Risk Analysis Method for Enterprises?

Thu, 16 Feb 2017 24:00:00 EST

In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available. Published by: Presidio Networked Solutions



Email Security Threats: Not Just from the Outside

Mon, 20 Feb 2017 24:00:00 EST

Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies. Published by: Mimecast



2017 Study on Mobile and IoT App Security

Tue, 31 Jan 2017 24:00:00 EST

According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps. Published by: IBM



The Mimecast Email Security Risk Assessment 2017

Mon, 20 Feb 2017 24:00:00 EST

By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type. Published by: Mimecast



Taking a Proactive Approach to Addressing Ransomware

Wed, 08 Feb 2017 24:47:20 EST

In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs. Published by: AttackIQ



Sizing up Oracle Upgrades: Exadata with Oracle Database 12c

Fri, 10 Feb 2017 24:00:00 EST

In this expert e-guide, 20-year industry veteran Brian Peasley explores the top 10 reasons for upgrading Oracle databases to 12c. Discover how DBAs can improve their management of Oracle systems and how Oracle Exadata Database Machine enables analytics, batch, reporting, and other tasks to run simultaneously across databases. Published by: Oracle



10 Key Findings From the Ponemon Institute’s Mobile & IoT Application Security Testing Study

Fri, 17 Feb 2017 24:00:00 EST

This article reveals 10 key findings from Ponemon's "2017 State of Mobile & Internet of Things (IoT) Application Security Study." Published by: IBM



IT Project ANZ: App Development

Fri, 17 Feb 2017 24:00:00 EST

In this guide, we show you some of the technologies helping in-house IT teams to release and deploy new applications as swiftly as possible, without disrupting business operations. From Software as a Service to DevOps and containers, Australia/New Zealand-based organisations are beginning to embrace these flexible and agile approaches. Published by: ComputerWeekly.com



Taking a Proactive Approach to Addressing Ransomware

Thu, 09 Feb 2017 24:00:00 EST

Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations. Published by: AttackIQ



Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity

Thu, 16 Feb 2017 24:00:00 EST

The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more. Published by: IBM



Why Ransomware Attacks Are A Growing Threat To Health IT

Wed, 15 Feb 2017 24:00:00 EST

Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide. Published by: Cisco



How to Prevent and Respond to a Healthcare Ransomware Infection

Thu, 02 Feb 2017 24:00:00 EST

In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened. Published by: Cisco



Busting the Myth of the Malware “Silver Bullet”

Thu, 16 Feb 2017 24:00:00 EST

This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats. Published by: Intel Security



What you should know: Hot data backup techniques and trends

Mon, 13 Feb 2017 24:00:00 EST

One of the new data backup techniques fundamentally changing the way people recover from a storage system failure is recovery-in-place. Discover best use cases and how to fully leverage recovery-in-place. Read on to learn six more business continuity management system trends shaping the industry. Published by: Hedvig Inc



Backup target features expand use cases and evolve for better data protection

Mon, 13 Feb 2017 24:00:00 EST

Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance. Published by: Hedvig Inc