Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  data  dns  guide  learn  protection  published computerweekly  published splunk  published  ransomware  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Mon, 22 May 2017 14:15:21 EDT

Last Build Date: Mon, 22 May 2017 14:15:21 EDT

 



Compare desktop virtualization options: DaaS vs. VDI

Thu, 18 May 2017 24:00:00 EDT

It can be difficult to compare VDI vs. DaaS when determining which, if either is right for your organization. In this e-guide gain an understanding of the different capabilities each delivery method offers, and find use cases for each. Published by: Citrix



Computer Weekly –23 May 2017: Global ransomware attack could be a security wake-up call

Tue, 23 May 2017 24:00:00 EDT

In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? We find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management. Read the issue now. Published by: ComputerWeekly.com



Operationalizing Threat Intelligence for Enterprise Security

Fri, 19 May 2017 24:00:00 EDT

In this white paper, learn about a system designed to help you manage, categorize, and investigate security anomalies based on data that has been automatically collected and aggregated from multiple sources. Published by: Splunk



The 6 Essential Capabilities of an Analytics-Driven SIEM

Fri, 19 May 2017 24:00:00 EDT

Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed. Published by: Splunk



Data Protection: Not Just About Personal Data and Compliance

Thu, 18 May 2017 24:00:00 EDT

Despite the focus on data protection, many organizations are still leaving their data wide open for attack. Access this e-guide now to learn if a cloud-based data storage and protection strategy works and is right for you. Published by: Arrow + NetApp



CW Nordics May 2017

Thu, 18 May 2017 24:00:00 EDT

The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The Internet of Things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more. Published by: ComputerWeekly.com



Focus: how to avoid being hit by ransomware

Thu, 18 May 2017 24:00:00 EDT

In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software. Published by: ComputerWeekly.com



Avoid Human Error with AWS CodeDeploy

Thu, 11 May 2017 24:00:00 EDT

Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors. Published by: Splunk



Monitoring AWS Comes Down to Tool Choice

Fri, 12 May 2017 24:00:00 EDT

AWS is introducing more features and services to make public cloud more easily manageable. This e-guide explores three of those services to help you get your hands around AWS security and resource configurations. Published by: Splunk



Choosing an Optimal Solution for DDoS Protection

Wed, 17 May 2017 24:00:00 EDT

Discover which cloud-based DDoS protection could work best for your organization, including on-premise, on-demand, always-on, and hybrid cloud options. Published by: Radware



GDPR Developments Will Dominate Storage and Compliance in 2017

Thu, 11 May 2017 24:00:00 EDT

In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more. Published by: Arrow + NetApp



Bridging the Gap Between IT Operations & Security

Wed, 17 May 2017 24:00:00 EDT

Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network. Published by: Splunk



Cloud DDoS Protection Service – Protecting AWS-Hosted Applications

Tue, 16 May 2017 24:00:00 EDT

Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more. Published by: Radware



How to Effectively Manage the Cloud Logs of Security Events

Thu, 11 May 2017 24:00:00 EDT

Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue. Published by: Splunk



The Right Tools Smooth the DevOps Transition

Fri, 12 May 2017 24:00:00 EDT

Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more. Published by: Splunk



2016 Mobile Security & Business Transformation Study

Tue, 16 May 2017 24:00:00 EDT

In this research report, learn how mobile adoption grew and changed in 2016, and how this information can help you secure your apps and devices in the years to come. Published by: IBM



Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector

Tue, 16 May 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now. Published by: ComputerWeekly.com



Unified Communication: “It should work as easily as a telephone call!”

Mon, 15 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series explains the security implications of unified communication. Published by: ComputerWeekly.com



The Number 1 Question You Should Ask Any Potential DNS Vendor

Fri, 30 Dec 2016 24:00:00 EST

Learn the number one question you should ask any potential DNS vendor to ensure you employ a managed DNS that improves Internet performance, user experiences and business results. Published by: Dyn



The EU General Data Protection Regulation (GDPR): A Pocket Guide

Fri, 12 May 2017 24:00:00 EDT

Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more. Published by: DataStax



Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

Fri, 05 May 2017 24:00:00 EDT

Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider. Published by: Nerdio



Rethink DNS

Fri, 30 Dec 2016 24:00:00 EST

This e-book details why you need to rethink DNS from several different perspectives, including your DNS choices, the importance of DNS for digital resilience and the overall value you place on DNS. Published by: Dyn



Countering Evolving Cybersecurity Challenges

Mon, 23 Jan 2017 24:00:00 EST

Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms. Published by: Fortinet, Inc.



Digital Transformation and Network Security

Tue, 31 Jan 2017 24:00:00 EST

In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges. Published by: Forcepoint



Testing NGFW: Three Points of Value Critical to your Enterprise

Thu, 11 May 2017 24:47:46 EDT

In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more. Published by: Forcepoint



How Technology helps with the reporting burden-KPMG

Thu, 11 May 2017 24:00:00 EDT

Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM. Published by: Tagetik Software



Understanding and Mitigating DDoS Attacks

Thu, 11 May 2017 24:00:00 EDT

Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more. Published by: Dyn



The IoT Explosion's Impact on Enterprise Security

Thu, 09 Feb 2017 24:00:00 EST

Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany Published by: Fortinet, Inc.



Rethinking the Approach to Cybersecurity

Tue, 31 Jan 2017 24:00:00 EST

Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware. Published by: Fortinet, Inc.



Advanced Security Analytics Safeguards the Enterprise

Tue, 09 May 2017 24:00:00 EDT

Learn the position of advanced security analytics in today's modern enterprise as well as what types of products fall into this category, how they interact with other products, and more. Published by: Splunk



Network Management and Operational Efficiency: How the Right NGFW Makes It Possible

Wed, 10 May 2017 24:00:00 EDT

Learn about how you can find a next-gen firewall (NGFW) system that is built to fit the strength and scalability your business needs, with the simplicity and efficiency that you want in this white paper. Published by: Forcepoint



Quest’s Spotlight performance management driven by Azure SQL Database

Wed, 10 May 2017 24:00:00 EDT

Learn about "Spotlight on SQL Server Enterprise" by Quest and how you can monitor, detect, diagnose, and provide a way to resolve performance issues in SQL Server – both at your desk or from home. Published by: Quest



Fortinet Ransomware Guide

Thu, 09 Feb 2017 24:00:00 EST

This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack. Published by: Fortinet, Inc.



A Security Leaders Definitive Guide to the Threat Landscape

Mon, 30 Jan 2017 24:00:00 EST

This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it. Published by: Fortinet, Inc.



5 Ways To Prepare Your Infrastructure For Disaster

Tue, 09 May 2017 24:00:00 EDT

Learn 5 steps you can take to ready your infrastructure for disaster ahead of time, so that you can backup your data faster and keep downtime low. Published by: Dyn



Understanding What Matters Most When Selecting Managed DNS

Fri, 30 Dec 2016 24:00:00 EST

In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider. Published by: Dyn



The Investigatory Powers Act 2016 and Internet Connections Records

Tue, 09 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016. Published by: ComputerWeekly.com



Tackling the Disrupted Customer Journey: A Customer 360 View for Financial Institutions

Tue, 09 May 2017 24:00:00 EDT

Why do 63% of customers feel their banks don't understand their needs when 70% of banking executives claim customer centricity to be highly important? Access this report to get a 360 degree view of the disrupted customer journey, and learn how to close the customer expectancy gap. Published by: DataStax



Sleeping Well with Cloud Services

Tue, 09 May 2017 24:00:00 EDT

As cloud-based solutions grow in popularity, so too do concerns surrounding security. Access this white paper to learn about the state of cloud service security and what to look for in any services you might contract moving forward. Published by: Comarch



DevSecOps: Putting the Security in DevOps

Thu, 04 May 2017 24:00:00 EDT

Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more. Published by: Sonatype



How to Ensure Mobile Employee Productivity with a Secure EMM Strategy

Mon, 01 May 2017 24:00:00 EDT

Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security. Published by: BlackBerry



Computer Weekly – 9 May 2017: Casting the IT skills net wider

Tue, 09 May 2017 24:00:00 EDT

In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now. Published by: ComputerWeekly.com



The 5 Features of an Always On Data Platform

Mon, 08 May 2017 24:00:00 EDT

Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more. Published by: DataStax



Strengthen Your Security Posture by Mapping Network Traffic to Users

Sat, 31 Dec 2016 24:00:00 EST

This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting. Published by: Palo Alto Networks



The Challenges of Managing SSL/TLS Encrypted Traffic

Fri, 05 May 2017 24:00:00 EDT

Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan. Published by: Gigamon



Enhance Data Protection with Analytics and Insights

Fri, 05 May 2017 24:00:00 EDT

Learn how to maintain an agile data protection strategy that allows you to adapt to fast-changing markets, organizational demands, and the new demands of acquisitions. Published by: Hewlett Packard Enterprise



Soaring to Success: Secure Mobility at 40,000ft

Fri, 05 May 2017 24:00:00 EDT

Discover the story of how one airline transformed its approach to corporate mobility, adopting new secure technologies and processes and delivering a new program with demonstrable return on investment. Published by: Wandera



Relentlessly Protect Your Data From Ransomware

Fri, 05 May 2017 24:00:00 EDT

Learn how to adopt a three-pronged ransomware prevention and remediation strategy that can educate your workforce to serve as your first line of defense, reduce endpoint vulnerability with a security ecosystem, and mitigate ransomware loss with backup recovery. Published by: arcserve



CW Benelux - May 2017: 3D printing on the rise

Thu, 04 May 2017 24:00:00 EDT

Is blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more. Published by: ComputerWeekly.com



Data Center Services: Trust the Professionals

Fri, 05 May 2017 24:00:00 EDT

Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit. Published by: Comarch