Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/rss/multi/ka_bp_security.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
computer weekly  data  dell emc  discover  guide  learn  network security  network  published rapid  published  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 23 Jun 2017 15:00:16 EDT

Last Build Date: Fri, 23 Jun 2017 15:00:16 EDT

 



Public Employees' Retirement System Increases Network Visibility and Streamlines Security

Fri, 23 Jun 2017 24:00:00 EDT

Discover how a Public Employees' Retirement System senior network engineering lead and his team enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more. Published by: Gigamon



Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting

Fri, 23 Jun 2017 24:00:00 EDT

Discover how Vela Trading Technologies used the Gigamon Visibility Platform to bolster their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more. Published by: Gigamon



See What Matters: Closing Gaps in Network Visibility

Thu, 22 Jun 2017 24:00:00 EDT

Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security. Published by: Gigamon



Troubling Trends in Network Security

Thu, 22 Jun 2017 24:00:00 EDT

Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics. Published by: Gigamon



Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

Tue, 06 Jun 2017 24:00:00 EDT

In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2. Published by: Forcepoint



Overcoming the Human Factor with Visibility-Centric Security

Wed, 21 Jun 2017 24:00:00 EDT

Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity. Published by: Gigamon



Is Your IT Security Affecting Your Workforce Productivity?

Tue, 20 Jun 2017 24:00:00 EDT

Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security. Published by: Dell India



Pervasive Visibility Platform – A New Approach to Network Monitoring

Fri, 31 Mar 2017 24:00:00 EDT

Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more. Published by: Gigamon



Top 5 Reasons to Choose Dell EMC For Data Protection

Tue, 20 Jun 2017 24:00:00 EDT

Discover 5 ways in which Dell EMC's data protections suite can give your business the enterprise-grade data protection you need to accelerate your digital transformation. Published by: Dell EMC Intel®



Top 5 Reasons This Data Protection Suite Stands Out

Mon, 19 Jun 2017 24:00:00 EDT

Go inside this white paper to learn about a family of data protection software designed to work in harmony to keep your information safe. Published by: Dell EMC Intel®



Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage

Wed, 31 May 2017 24:00:00 EDT

Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage. Published by: Dell EMC Intel®



Is Your Lack of Mobile Security Affecting Your Workforce Productivity?

Mon, 31 Oct 2016 24:00:00 EDT

In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification. Published by: Dell India



Power of Proxy in Security

Tue, 06 Jun 2017 24:00:00 EDT

With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threat, the "too many devices" problem, ensure compliance, and more. Published by: Symantec & Blue Coat Systems



Your expert guide to the highlights of Infosecurity Europe 2017

Mon, 19 Jun 2017 24:00:00 EDT

Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London. Published by: ComputerWeekly.com



Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

Mon, 19 Jun 2017 24:00:00 EDT

Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps. Published by: Gigamon



What can CIOs do about the IT skills shortage in ANZ?

Mon, 19 Jun 2017 24:00:00 EDT

CIOs in Australia and New Zealand, like their counterparts in other parts of the world, have been facing shortages in IT talent that have become more acute in recent years. In this e-guide, read more about IT talent issues in Oceania. Published by: ComputerWeekly.com



Symantec GDPR

Tue, 06 Jun 2017 24:00:00 EDT

With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018. Published by: Symantec & Blue Coat Systems



TIBCO Spotfire Server Overview

Tue, 21 Feb 2017 24:00:00 EST

With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale. Published by: TIBCO Software Inc.



An All-In-One Data Protection Infographic

Fri, 16 Jun 2017 24:00:00 EDT

Learn how to focus on growing your business rather than worrying about your data's safety. Access this infographic and discover how to protect your data at every point possible. Published by: Dell EMC Intel®



Avoid Multicloud Integration Costs

Mon, 12 Jun 2017 24:00:00 EDT

Experts anticipate significant growth in the multicloud model, but so will your application integration costs. This e-guide discusses the multicloud deployment and integration three-step process and how to go about identifying and reducing multicloud integration costs. Published by: Rackspace



Six Criteria for Buying Data Loss Prevention Products

Wed, 07 Jun 2017 24:00:00 EDT

Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses. Published by: InteliSecure



Introduction to Data Loss Prevention Tools

Wed, 07 Jun 2017 24:00:00 EDT

In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more. Published by: InteliSecure



A Computer Weekly Buyer's Guide to EU General Data Protection

Tue, 30 May 2017 24:00:00 EDT

The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare. Published by: ComputerWeekly.com



Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

Tue, 13 Jun 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends. Published by: ComputerWeekly.com



How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

Fri, 09 Jun 2017 24:00:00 EDT

In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more. Published by: Rapid7



How the Basics of Network Security Have Evolved

Mon, 05 Jun 2017 24:00:00 EDT

In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months. Published by: Fortinet, Inc.



Building a More Effective Vulnerability Scanning Program

Fri, 09 Jun 2017 24:00:00 EDT

This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior. Published by: Rapid7



Building a World-Class Web Application Security Program

Thu, 08 Jun 2017 24:00:00 EDT

Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system. Published by: Rapid7



Cloud Computing Top Threats

Thu, 08 Jun 2017 24:00:00 EDT

This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy. Published by: HPE and Intel® Corporate



IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg

Thu, 08 Jun 2017 24:00:00 EDT

Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study. Published by: Rapid7



The Smart, Secure Cloud for Singapore

Thu, 08 Jun 2017 24:00:00 EDT

In this white paper, explore about this cloud infrastructure which is designed to build, deploy, and operate services securely at scale. Published by: Google Cloud



Gain Deeper Insights into Your System with this Vulnerability Management System

Thu, 08 Jun 2017 24:00:00 EDT

In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business. Published by: Rapid7



Wi-Fi: Secure Enough for The Federal Government?

Fri, 30 Sep 2016 24:00:00 EDT

As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government. Published by: HPE and Intel® Corporate



How IoT is Changing The Security Landscape

Thu, 01 Jun 2017 24:00:00 EDT

In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology. Published by: Fortinet, Inc.



The Security Risks of IoT

Wed, 31 May 2017 24:00:00 EDT

In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose. Published by: Fortinet, Inc.



Planning for Office 365 Gaps

Wed, 07 Jun 2017 24:00:00 EDT

In this white paper, learn how to use third party offerings, and put a plan into action to keep your system safe from the 3 risks that Office 365 poses. Published by: Mimecast



Vulnerability Management Buyer's Guide

Wed, 07 Jun 2017 24:00:00 EDT

In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system. Published by: Rapid7



Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

Wed, 07 Jun 2017 24:00:00 EDT

In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities. Published by: Rapid7



What do 200 IT Decision Makers Think of Office 365?

Tue, 06 Jun 2017 24:00:00 EDT

In the fall of 2016, 200 IT decision makers from around the globe were interviewed by VansonBourne Research about their experience using Office 365 Exchange online in 4 areas. Read what they had to say by clicking inside. Published by: Mimecast



Closing The Cloud Email Security Gap

Tue, 31 Jan 2017 24:00:00 EST

This Forrester Research Report surveys 220 IT pros tests the hypothesis that organizations are unaware of how at risk their cloud email systems are, and need to take extra steps to make sure their data remains secure. Published by: Mimecast



A Computer Weekly Buyer's Guide to SAP Hana Deployment

Tue, 09 May 2017 24:00:00 EDT

SAP's Hana in-memory data platform promises to transform business processes. In this 11-page buyer's guide, Computer Weekly looks at how Hana is changing traditional SAP architecture, how it has streamlined customer services for one business, and why there is confusion over Hana implementation. Published by: ComputerWeekly.com



Universal Storage for Data Lakes: An ESG Evaluation

Thu, 30 Nov 2017 24:00:00 EST

This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more. Published by: Dell EMC and Intel®



Application Security Buyers Guide: 15 Requirements

Tue, 06 Jun 2017 24:00:00 EDT

In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision. Published by: Rapid7



7 Questions to Ask Your Dynamic Application Security Scanning Vendor

Tue, 06 Jun 2017 24:00:00 EDT

In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision. Published by: Rapid7



How the National Theatre Was Able to Provide Affordable Network Security

Mon, 05 Jun 2017 24:00:00 EDT

In this case study learn how London's National Theatre was able to find a vulnerability scaling program that helped them meet compliance regulations, and maintain a high level of security in a low-maintenance manner. Published by: GFI



SSL: Get the Best for You and Mitigate Vulnerabilities

Tue, 30 May 2017 24:00:00 EDT

Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more. Published by: A10 Networks



7 Steps to Successfully Implementing Security Controls in Your Organization

Mon, 05 Jun 2017 24:00:00 EDT

In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning. Published by: Rapid7



How Hopkins Homes Ltd. Kept Their Network Clean Without Overreaching

Mon, 05 Jun 2017 24:00:00 EDT

In this case study, learn how Hopkins Homes Ltd., a residential development company was able to implement an internet policy that keeps the network safe while allowing employees to police themselves. Published by: GFI



Active defence through deceptive IPS

Mon, 05 Jun 2017 24:00:00 EDT

This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks Published by: ComputerWeekly.com



Computer Weekly – 6 June 2017: General Election 2017: Who gets the tech vote?

Tue, 06 Jun 2017 24:00:00 EDT

In this issue of Computer Weekly, as the UK votes for a new government, examine the digital policies in the manifestos of the Conservative, Labour and Liberal Democrat parties, and hear what IT trade body TechUK would like to see for the tech sector from the next administration. Read the issue now. Published by: ComputerWeekly.com