Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cloud  data protection  data  enterprise  information  learn  management  mobile  published  security  white paper  white 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Mon, 27 Mar 2017 14:35:15 EDT

Last Build Date: Mon, 27 Mar 2017 14:35:15 EDT

 



Podcast: Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace

Tue, 14 Mar 2017 24:00:00 EDT

In this podcast, security veteran and writer of Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel, discusses the technical and operational security concerns of modern networks. Published by: Hewlett Packard Enterprise



Focus: IT for government and public sector

Mon, 27 Mar 2017 24:00:00 EDT

It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy. Published by: ComputerWeekly.com



Five Windows 10 security risks that are easy to overlook

Fri, 17 Mar 2017 24:00:00 EDT

As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook. Published by: vmware airwatch



Modern Security for the Modern Data Center

Fri, 30 Sep 2016 24:00:00 EDT

Upgrading your data center security from an antiquated perimeter-based model is in your best interest if you don't want to end up dealing with the financial impact of a breach. Inside learn about a new, advanced data center security model that provides the protection your business needs for today and the future. Published by: VMware



Modernizing Your Data Center's Security

Fri, 30 Sep 2016 24:00:00 EDT

The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats. Published by: VMware



Dell EMC Data Protection Suite Enterprise Edition Solution Specifications

Fri, 24 Mar 2017 24:00:00 EDT

Inside learn about what you can gain by adopting the Dell EMC Data Protection Suite Enterprise Edition Published by: Dell and Microsoft



A Data Protection Suite for Archive Solution Specification

Thu, 23 Mar 2017 24:00:00 EDT

In this white paper, learn about a 5 individual security suites designed to solve a broad spectrum of data protection issues. Published by: Dell and Microsoft



Information Governance: Protect Your Company's Assets

Wed, 22 Mar 2017 24:00:00 EDT

This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept. Published by: Box



Keeping Your Office 365 Implementation Secure and Effective

Fri, 03 Mar 2017 24:00:00 EST

In this webinar, learn how to handle security concerns in your Office 365 deployment. Also learn how to best address your content management needs before, during, and after Office 365 transition, and what you can do to help your employees make the most of the suite's features. Published by: Box



Data Governance: Embracing Security and Privacy

Tue, 21 Mar 2017 24:00:00 EDT

With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy. Published by: Tealium



Hybrid Cloud Storage Strategies

Thu, 22 Sep 2016 24:00:00 EDT

Hybrid cloud is the storage option that gives customers the flexibility and scalability they need at the cost they want, but needs to be properly managed for you to realize any of these benefits. Watch this brief interview to learn about hybrid cloud storage strategies and how to make the most of your cloud investment. Published by: IBM



Achieve A Single View Of The Retail Customer For Deeper Insight

Tue, 21 Mar 2017 24:00:00 EDT

Consumer behavior changes constantly, threatening retailers' business objectives. But there are new opportunities for retailers willing to capture and analyze this behavior to gain insights and maintain their edge. Discover how to push your company to adapt to the evolving customer. Plus, learn about the role big data plays in this new landscape. Published by: Hortonworks



Combat Today's Threats with A New Approach to Security

Tue, 21 Mar 2017 24:00:00 EDT

An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way. Published by: Fortinet, Inc.



Mobile device Management - Keep up with your mobile workforce

Thu, 26 Nov 2015 24:00:00 EST

Discover a device manager that has combined EMM and software asset management to minimize the impact of mobility on the service desk and deliver a safe environment for employees to use sensitive information and apps on mobile devices. Published by: Snow Software



How To Limit Privileged Accounts And Boost Security

Wed, 15 Mar 2017 24:00:00 EDT

Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts. Published by: Devolutions



How To Implement a Records and Information Management Risk Control Framework

Thu, 31 Dec 2015 24:00:00 EST

In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more. Published by: Iron Mountain



5 Steps To Defining Your Data Retention Policies

Wed, 13 Jan 2016 24:00:00 EST

Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps. Published by: Iron Mountain



Understanding the IoT Explosion and Its Impact on Enterprise Security

Thu, 16 Mar 2017 24:00:00 EDT

Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more. Published by: Fortinet, Inc.



2017 Analyst Report for Application Security Testing

Thu, 16 Mar 2017 24:00:00 EDT

In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams. Published by: IBM



FI-TS Provides SAP in the Cloud Securely with Enterprise Virtualization

Wed, 30 Apr 2014 24:00:00 EDT

How can an IT service provider for the financial and insurance industry provide the most up-to-date services to ensure that clients meet both regulatory and customer expectations? Access this case study to learn how one IT outsourcicng partner was able to reduce costs while optimizing processes with cloud technology. Published by: Red Hat



How to Achieve Stronger Information Security

Mon, 25 Jan 2016 24:00:00 EST

Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security. Published by: Iron Mountain



The Future of Privileged Management: Understanding the Bigger Picture

Thu, 08 Dec 2016 24:00:00 EST

Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management. Published by: One Identity



Investing in the Data Center to Meet Modern Customer Demands

Wed, 07 Dec 2016 24:00:00 EST

Data center modernization is one way to boost digital transformation and innovation efforts. Read on to see what Forrester found in their research on how organizations are going about their modernization, the benefits they are realizing, and more. Published by: Red Hat



Focus ANZ: Enterprise Mobility

Thu, 16 Mar 2017 24:00:00 EDT

With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient. Published by: ComputerWeekly.com



Focus ASEAN: Enterprise Mobility

Thu, 16 Mar 2017 24:00:00 EDT

With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient. Published by: ComputerWeekly.com



Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts

Wed, 15 Mar 2017 24:00:00 EDT

This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities. Published by: ComputerWeekly.com



How Enterprise Security Leaders are Now Forced to Address Top Security Threats

Wed, 15 Mar 2017 24:00:00 EDT

Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose. Published by: Fortinet, Inc.



Your Guide to the Threat Landscape

Wed, 15 Mar 2017 24:00:00 EDT

Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence. Published by: Fortinet, Inc.



Cyber-physical attacks: Dawn of a new age in cyber-warfare?

Tue, 14 Mar 2017 24:00:00 EDT

This article in our Royal Holloway Security Series explores the application of cyber power in international relations Published by: ComputerWeekly.com



Ransomware guide

Tue, 14 Mar 2017 24:00:00 EDT

Learn how to defend your organization from ransomware with an advanced security model, utilizing next-generation firewalls, layered security, and proactive threat intelligence. Published by: Fortinet, Inc.



Identify and Manage Fraud Better with Analytics

Tue, 14 Mar 2017 24:00:00 EDT

This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors. Published by: BAE Systems



How mobile remote desktop apps work

Fri, 10 Mar 2017 24:00:00 EST

Mobile remote desktop apps can be an important tool for mobile workers. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work. Published by: LogMeIn Rescue Lens



5 Cornerstones to Devising Your Backup & Continuity Defense

Mon, 13 Mar 2017 24:00:00 EDT

Inside, learn 5 cornerstones to devising your single-point backup and continuity defense plan. Published by: Unitrends



Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

Tue, 14 Mar 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now. Published by: ComputerWeekly.com



Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup

Mon, 13 Mar 2017 24:00:00 EDT

Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more. Published by: Unitrends



Sleeping Android: the danger of dormant permissions

Mon, 04 Mar 2013 24:00:00 EST

This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. Published by: ComputerWeekly.com



How To Recover Data From Server Failure

Mon, 13 Mar 2017 24:00:00 EDT

When a server fails, you need data restored in minutes rather than hours in order to minimize the impact to the business. Inside this technical brief, learn about a tool by Quest that can help you recover data and apps from a server failure in a few simple steps. Published by: Quest



Take a Cloud First Approach to Modernize Data Protection

Mon, 13 Mar 2017 24:03:11 EDT

Traditional backup systems are no longer affordable, nor flexible enough for the modern business. Learn how you can streamline your backup and recovery programs while lowering TCO with the cloud thanks to this section of our site dedicated to helping you save costs and improve business agility with cloud-based data protection. Published by: Druva Software



Secure Mobile Access for BYOD

Fri, 30 Dec 2016 24:00:00 EST

Bring-your-own-device (BYOD) initiatives carry inherent risks. And securing BYOD with layers of disparate technologies can create security gaps. This e-book explores how converged tools can ensure mobile workforce management and mobile security management. Published by: SonicWall



CW ASEAN March 2017: Raising national security standards

Thu, 09 Mar 2017 24:00:00 EST

In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems. Published by: TechTarget ANZ



CW ANZ March 2017: Take cover from cyber threats

Thu, 09 Mar 2017 24:00:00 EST

In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance. Published by: TechTarget ANZ



Multiple Cloud Connectivity and Recovery Options Gives This Backup Software A Leg-Up

Mon, 31 Oct 2016 24:00:00 EDT

While backing your data up is crucial, it means nothing if you don't have a way to recover that information quickly and easily. In this white paper, learn about a program that lets you do just that, as well as the flexibility to restore VMs to different hypervisors, multiple physical and virtual restore options. Published by: Quest



The Different Types of Cyber-Attacks and How to Prevent Them

Fri, 30 Dec 2016 24:00:00 EST

This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more. Published by: SonicWall



A Massively Scalable Approach to Network Security

Fri, 30 Dec 2016 24:00:00 EST

This white paper details a better approach to network security: an innovative network-based model for massively scaling a next-generation firewall that can address today's network needs and provide increased performance, higher resiliency and lower TCO. Published by: SonicWall



SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race

Tue, 31 Jan 2017 24:00:00 EST

This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond. Published by: SonicWall



THE SILVER LINING - Protecting Corporate Information in the Cloud

Fri, 10 Mar 2017 24:00:00 EST

In this quick infographic discover the hard numbers on how to protect corporate information in the cloud, and how the numbers of companies not embracing the cloud is shrinking. Published by: Symantec & Blue Coat Systems



Eight Ways to Protect Your Network Against Ransomware

Fri, 30 Dec 2016 24:00:00 EST

This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals. Published by: SonicWall



The Benefits of Public Cloud for Data Protection

Fri, 10 Mar 2017 24:00:00 EST

Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection. Published by: Quest



Hackers Have a Plan to Get to Your Privileged Accounts

Fri, 10 Mar 2017 24:00:00 EST

Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation. Published by: One Identity



Strategies to Ensure Success for your Privileged Management Project

Fri, 10 Mar 2017 24:00:00 EST

Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts. Published by: One Identity