Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
access  cloud  compliance  data protection  data  dell emc  discover  gdpr  learn  management  protection  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Mon, 24 Apr 2017 16:35:15 EDT

Last Build Date: Mon, 24 Apr 2017 16:35:15 EDT


The Next Security Frontier: Automation, Things and Intelligent Machines

Mon, 24 Apr 2017 08:15:00 EDT

Stay on top of the current cybersecurity landscape and join us for this live virtual conference on June 27th. Published by:

Identity Management: The Key to Stopping Breaches

Mon, 24 Apr 2017 24:00:00 EDT

With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more. Published by: SailPoint Technologies

Focus: Network security

Mon, 24 Apr 2017 24:00:00 EDT

During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end. Published by:

Achieving Optimal IFRS 9 Compliance

Mon, 24 Apr 2017 24:00:00 EDT

Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more. Published by: SAS

How to Secure Your Digital Experience

Wed, 19 Apr 2017 24:00:00 EDT

Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape Published by: Oracle Corporation

IAM: Your Tool to Defeating Data Breaches

Fri, 21 Apr 2017 24:00:00 EDT

A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more. Published by: SailPoint Technologies

Security Report: Transaction Monitoring Optimization

Sat, 31 Dec 2016 24:00:00 EST

Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind. Published by: SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation

Fri, 21 Apr 2017 24:00:00 EDT

Failing to comply with the GDPR results in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands. Published by: SAS

Maximizing The Value of Web Application Firewalls

Fri, 29 Apr 2016 24:00:00 EDT

In this white paper, learn some best—practices for managing your web application firewall (WAF) such as 3 basic rules for running your WAF when it's in 'alert mode', why data analytics is key to building an intelligent WAF, and more. Published by: Akamai


Fri, 21 Apr 2017 24:00:00 EDT

Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline. Published by: SailPoint Technologies

Are You Ready for New Data Recovery Regulations?

Fri, 25 Nov 2016 24:00:00 EST

With this new data recovery appliance for your Oracle databases, you'll be able to instantly view your unprotected data, and take immediate action with end-to-end block validation. Read on and learn how you can gain rewind and playback abilities, minimization of your unprotected data window, and more. Published by: Oracle Corporation

Cyber Threats: A perfect storm about to hit Europe?

Fri, 21 Apr 2017 24:00:00 EDT

As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals. Published by:

Do You Know Who Owns Your Data?

Thu, 20 Apr 2017 24:00:00 EDT

Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more. Published by: SailPoint Technologies

How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost

Thu, 20 Apr 2017 24:00:00 EDT

Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more. Published by: Wandera

Manage & Secure Your Mobile Data Effectively

Thu, 20 Apr 2017 24:00:00 EDT

Mobile has been one of the most disruptive forces in business. Enterprises have been scrambling to get the right systems in place to equip employees with the best quality data plans and effectively manage that usage centrally. Learn how to tighten your mobile data security and data usage management. Published by: Wandera

The Ultimate Guide to the CCSP

Thu, 20 Apr 2017 24:00:00 EDT

Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence. Published by: ISC2

Information Security magazine Insider Edition, April 2017

Mon, 10 Apr 2017 24:00:00 EDT

Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools. Published by:

Employee Monitoring: An Important Security Measure?

Wed, 12 Apr 2017 24:00:00 EDT

Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this. Published by: Veriato, Inc.

Mobile Data Research Report

Wed, 19 Apr 2017 24:00:00 EDT

Mobile data continues to change and grow each year – and because of this frequency of change, it's important to know how your data may be affected. Learn about new mobile threats, compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage, and more. Published by: Wandera

Hackers Share Secrets so You Can Make Their Job Harder

Sat, 31 Dec 2016 24:00:00 EST

Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts. Published by: Thycotic

What New NIST Password Recommendations Should Enterprises Adopt?

Tue, 11 Apr 2017 24:00:00 EDT

Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines. Published by: Specops Software

A Safe Password System? Here's How

Tue, 11 Apr 2017 24:00:00 EDT

Learn the ropes of what makes for more effective password risk management, how to avoid common pitfalls organizations make in implementing password policies, and 3 major risks of password compromise. Published by: Specops Software

Data protection: Not just about personal data and compliance

Tue, 18 Apr 2017 24:00:00 EDT

Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective. Published by:

Don't Rush into Cloud Databases without a Well-Grounded Plan

Fri, 07 Apr 2017 24:00:00 EDT

In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security. Published by: Data Intensity

7 Factors Driving Proper Encryption Management

Mon, 17 Apr 2017 24:00:00 EDT

Learn 7 key factors in encryption management that are driving ingenuity, bolstering native encryption, unifying management and transforming security. Published by: WinMagic

Dell EMC Data Protection in the Cloud

Fri, 14 Apr 2017 24:00:00 EDT

What if you could get data protection in the cloud ans save on storage costs? Watch this 5 minute video to learn about a service enables you to move data from your data domain platform to another object storage platform. Published by: Dell EMC

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

Fri, 14 Apr 2017 24:00:00 EDT

This white paper highlights must-have data security features deduplication should encompass. Access this resource now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth. Published by: Dell EMC

Ransomware Detection and Prevention Tools You Need Now

Sun, 05 Mar 2017 24:00:00 EST

Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need. Published by:

Your In-Depth Guide to GDPR

Tue, 11 Apr 2017 24:00:00 EDT

Gain an overview of what the key objectives of GDPR are, what it means for your organization, and what impact it will have on your business. Published by: Oracle Corporation UK Ltd

Deploying OpenShift container platform 3 on Google cloud platform

Tue, 24 Jan 2017 24:00:00 EST

This guide dives into an in-depth example demonstrating how OpenShift Container Platform 3 can be set up to take advantage of the native high availability capabilities of Kubernetes in order to create a highly available OpenShift Container Platform 3 environment. Published by: Red Hat

How Mobile Application Platform Integration Can Boost Security

Thu, 15 Dec 2016 24:11:19 EST

In this video, learn how you can mitigate security threats across your mobile application platforms by integrating your systems for data on the backend, as well as how middleware applications run in the cloud helps, and more. Published by: Red Hat

Native Hybrid Cloud: A Turnkey Pivotal Cloud Foundry Developer Platform

Tue, 11 Apr 2017 24:00:00 EDT

Access now to learn how to boost app developer productivity, empower developers with self-service, and eliminate the cost, time, and complexity of building and maintaining an in-house cloud infrastructure while navigating the cultural shift to DevOps with a native hybrid cloud platform. Published by: Dell EMC

Rapid Growth of SSL Encryption

Tue, 11 Apr 2017 24:00:00 EDT

Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more. Published by: Fortinet, Inc.

Top 5 Tips to Accelerate your Hyper-V infrastructure Projects

Tue, 11 Apr 2017 24:00:00 EDT

Looking to complete your Hyper-V infrastructure project under budget Read this webcast transcript as two virtual server experts highlight 5 methods of accelerating your Hyper-V infrastructure projects. You'll also gain security and compliance best practices for protecting your virtual workloads. Published by: Starwind 5nine

Why Data Modeling Is Still Relevant

Tue, 11 Apr 2017 24:00:00 EDT

There are those who think data modeling is passé or irrelevant. But data modeling offers a unique value not found in other techniques. Inside, learn what data modeling offers, how you can use it, and why it's still very much a relevant technique today. Published by: Quest

Data Replication and Oracle Databases: Top 5 Reasons to Choose SharePlex

Sat, 31 Dec 2016 24:00:00 EST

This white paper takes a closer look at SharePlex, one of your options for data replication in Oracle environments. Uncover the top 5 reasons for considering SharePlex and learn how to optimize database management with a comprehensive and scalable strategy. Published by: Quest

Cyber security in the Middle East

Tue, 11 Apr 2017 24:00:00 EDT

As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks. Published by:

Focus ASEAN: Security & Digital Transformation

Tue, 11 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally. Published by:

Q&A: Analyzing DNS Services with Paul Vixie

Tue, 04 Apr 2017 24:00:00 EDT

Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns. Published by: Farsight Security

How to Find the Best DDoS Attack Prevention and Detection Tools

Wed, 05 Apr 2017 24:00:00 EDT

In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy. Published by:

Dell EMC Global Data Protection Index: The Global Maturity of Data Protection

Mon, 10 Apr 2017 24:00:00 EDT

In this infographic, learn what 2,200 IT decision makers from 18 countries had to say about their backup and recovery experiences, strategies, and infrastructure. Access now to see where you stand in comparison. Published by: Dell EMC

Effective Information Governance Strategies

Mon, 03 Apr 2017 24:00:00 EDT

In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process. Published by: Iron Mountain

Network Security Trends - Understanding the State of Network Security Today

Tue, 31 Jan 2017 24:00:00 EST

Read this ESG research paper and learn how network security infrastructure, practice, and performance has changed during 2016 Published by: Gigamon

SSL/TLS Decryption: How to Avoid Blind-Spots and Camouflaged Attackers

Mon, 29 Feb 2016 24:00:00 EST

Use this ESG research content to explore why building a strategic approach to SSL/TLS encryption is the best way to work past visibility and vulnerability issues in your network. Then, discover a vendor that might be able to grant you this network access. Published by: Gigamon

New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises

Fri, 26 Aug 2016 24:00:00 EDT

With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines. Published by: Hewlett-Packard Enterprise

Dell EMC Data Protection: Your choice is simple

Fri, 07 Apr 2017 24:00:00 EDT

This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more. Published by: Dell EMC

7 Questions to Achieve GDPR Compliance

Fri, 18 Nov 2016 24:00:00 EST

Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more. Published by: Hewlett-Packard Enterprise

Focus ANZ: Security & Digital Transformation

Fri, 07 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks. Published by:

Information Insight for GDPR Compliance

Sun, 05 Feb 2017 24:00:00 EST

Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more. Published by: Hewlett-Packard Enterprise

Automated Network Monitoring and Management: A Better Way to Support Customers

Thu, 06 Apr 2017 24:00:00 EDT

Explore a remote monitoring and management platform for MSPs that implements automation for a variety of areas – from onboarding and setup to reporting and maintenance. Discover how to address the needs of your customers with comprehensive monitoring, integrated patch management, and more. Published by: Solarwinds MSP