Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 19 Jul 2017 15:50:14 EDT

Last Build Date: Wed, 19 Jul 2017 15:50:14 EDT

 



Is your IT Security Affecting your Workforce Productivity?

Wed, 05 Apr 2017 24:00:00 EDT

In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more. Published by: Dell and Microsoft



Workspaces of the Future

Wed, 31 Aug 2016 24:00:00 EDT

Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments. Published by: Citrix



The Top Cyber Security Trends in ANZ in 2017

Wed, 19 Jul 2017 24:00:00 EDT

In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by: ComputerWeekly.com



Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Tue, 18 Jul 2017 24:00:00 EDT

Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by: ComputerWeekly.com



Is the Endpoint Security Nightmare Ending?

Mon, 17 Jul 2017 24:00:00 EDT

The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be. Published by: SearchSecurity.com



The Evolution of IoT Analytics and Big Data

Wed, 12 Jul 2017 24:00:00 EDT

In this e-guide, Sisense co-founder Adi Azaria and Machina Research analyst Emil Berthelsen examine the current state of IoT analytics as well as where it's heading next. Learn about the impact IoT is having on everything from Hadoop big data platforms to real-time BI capabilities. Published by: Vitria Technology, Inc.



Is your IT Security Affecting your Workforce Productivity?

Fri, 30 Sep 2016 24:00:00 EDT

Click inside to find the major trends and drivers forcing organizations to change or adopt new security procedures in the wake of evolving threats. Published by: Dell and Microsoft



Focus: Disaster recovery planning and virtualisation

Mon, 17 Jul 2017 24:00:00 EDT

We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution. Published by: ComputerWeekly.com



Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

Mon, 17 Jul 2017 24:00:00 EDT

This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. Published by: ComputerWeekly.com



The Top Cyber Security Trends in ASEAN in 2017

Mon, 17 Jul 2017 24:00:00 EDT

For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks. Published by: ComputerWeekly.com



Mobile Apps Risk: Protect without Hindering Productivity

Mon, 10 Jul 2017 24:00:00 EDT

Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps. Published by: Blue Cedar



Mobile Security Risk Mitigation and Tips for Success

Tue, 11 Jul 2017 24:00:00 EDT

Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems. Published by: Blue Cedar



5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

Tue, 11 Jul 2017 24:00:00 EDT

Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches. Published by: Blue Cedar



CW ASEAN – July 2017: Be alert to threats

Thu, 13 Jul 2017 24:00:00 EDT

With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy. Published by: ComputerWeekly.com



CW ANZ – July 2017: Cyber security plan bears fruit

Thu, 13 Jul 2017 24:00:00 EDT

Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape. Published by: ComputerWeekly.com



Beyond your company boundaries

Wed, 12 Jul 2017 24:00:00 EDT

Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly. Published by: ComputerWeekly.com



European Perceptions, Preparedness and Strategies for IoT Security

Wed, 12 Jul 2017 24:00:00 EDT

Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices. Published by: ComputerWeekly.com



Discover a New Generation of Archiving and Disaster Recovery Systems

Mon, 10 Jul 2017 24:04:50 EDT

Click inside to explore a new generation of 4 flash-enabled storage systems, offering advanced backup and deduplication capabilities such as instant-access and restore, support for cloud-tier archiving, and more. Published by: Dell EMC Intel®



Print security: An imperative in the IoT era

Mon, 10 Jul 2017 24:00:00 EDT

Analyst group Quocirca gives the perspective on the risks and best practices of print security. Published by: ComputerWeekly.com



Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace

Wed, 21 Jun 2017 24:00:00 EDT

Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network Published by: Aruba Networks



Providing Business Continuity for Mission-Critical Applications

Fri, 07 Jul 2017 24:00:00 EDT

Going without a disaster recovery plan leaves your data center vulnerable. In this white paper, learn about how to create a plan to get you back on your feet after an outage, as well as a system that can be your DR "umbrella". Published by: DataCore Software Corporation



The Roadmap to Network Reliability

Fri, 07 Jul 2017 24:00:00 EDT

Uncover 3 steps to ensuring network reliability in the developing age of digital transformation and learn how to tackle pain points like growing traffic volumes, higher expectations for availability, the need to correct performance issues faster, and evolving security concerns. Published by: Juniper Networks, Inc.



Protecting and Enabling the Network

Fri, 07 Jul 2017 24:00:00 EDT

According to a recent IDG Research Services poll among IT leaders, security, network complexity, and growing traffic volumes are the top factors affecting enterprise network strategies. Find out how they're planning to tackle these issues with threat intelligence, private clouds, unified network security, and more. Published by: Juniper Networks, Inc.



Security Monitoring Solved: An Expert Path to Clairvoyant Defense

Wed, 05 Jul 2017 24:00:00 EDT

Security monitoring is essential for staying ahead of the threat landscape. In this exclusive webinar featuring Forrester Research, uncover the criteria for evaluating vendors, the benefits of integrated security platforms and much more. Published by: IBM



The Next Security Frontier: Automation, Things and Intelligent Machines

Tue, 27 Jun 2017 08:15:00 EDT

How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for. Published by: IBM



4 Reasons to Automate Your Network Right Now

Tue, 31 May 2016 24:00:00 EDT

To automate or not to automate – for organizations looking to increase their network agility and reliability, is it even a question anymore? Learn about the risks of not automating and uncover a 3-step roadmap to successful, cost-effective network automation. Published by: Juniper Networks, Inc.



Connectivity Key to Community: Redland City Council to Become a Smart City

Wed, 05 Jul 2017 24:00:00 EDT

Explore how the Redland City Council transformed their telephony system to break down siloes, improve mobility, and facilitate collaboration. Find out how they used a holistic information and communication technology (ICT) platform to improve access to key data that drives employee productivity and customer service. Published by: Optus



What can CIOs do about the skills shortage in ASEAN?

Tue, 04 Jul 2017 24:00:00 EDT

In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software. Published by: ComputerWeekly.com



IT Definitions: Storage Special

Thu, 29 Jun 2017 24:00:00 EDT

In this e-guide, we have put together a list of key definitions in storage and data protection to help you make sense of the fast-evolving storage technology landscape. From software-defined storage to non-volatile memory express (NVMe), we hope this extensive list of definitions will help you succeed in an increasingly data-driven world. Published by: ComputerWeekly.com



10 Reasons Your Cyber Security Strategy Needs A Checkup

Tue, 27 Jun 2017 24:00:00 EDT

Click into this infographic to learn the 10 reasons your security might need a checkup. Published by: Rackspace



Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

Tue, 27 Jun 2017 24:00:00 EDT

We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup. Published by: ComputerWeekly.com



What are Continuous Data Protection Software's Pros And Cons?

Tue, 20 Jun 2017 24:00:00 EDT

Click inside this expert-guide and learn the pros and cons of continuous data protection software. Published by: Dell EMC and Intel®



How can Cloud Computing Data Protection be Achieved?

Tue, 20 Jun 2017 24:00:00 EDT

Go inside this expert-guide by 25 year industry veteran Chris Evans to learn the 3 main ways to implement cloud computing data protection. Published by: Dell EMC and Intel®



Modernizing Data Center Protection

Thu, 22 Jun 2017 24:00:00 EDT

In this expert-guide by our Senior Analyst Jason Buffington, find out how we've gotten to the point we're at in data center DR, and where it's going in the future. Published by: Dell EMC and Intel®



Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?

Mon, 26 Jun 2017 24:00:00 EDT

Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges. Published by: ComputerWeekly.com



IoT & the Enterprise: Exploring Opportunities and Challenges in Asia

Mon, 26 Jun 2017 24:00:00 EDT

Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments. Published by: ComputerWeekly.com



Public Employees' Retirement System Increases Network Visibility and Streamlines Security

Fri, 23 Jun 2017 24:00:00 EDT

Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more. Published by: Gigamon



Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting

Fri, 23 Jun 2017 24:00:00 EDT

Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more. Published by: Gigamon



See What Matters: Closing Gaps in Network Visibility

Thu, 22 Jun 2017 24:00:00 EDT

Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security. Published by: Gigamon



Troubling Trends in Network Security

Thu, 22 Jun 2017 24:00:00 EDT

Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics. Published by: Gigamon



Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

Tue, 06 Jun 2017 24:00:00 EDT

In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2. Published by: Forcepoint



Evaluating Mobility Management Solutions for Common Use Cases

Wed, 21 Jun 2017 24:00:00 EDT

Digital workspaces are the next logical step in enhancing productivity and security, and providing users with the seamless experiences they need – whether they are travelling, remote, or roaming users. Download this webcast to discover what a digital workspace is comprised of, use cases, and how it can benefit your organization. Published by: Citrix



KordaMentha Relies on All-Flash Storage to Improve Business Performance

Thu, 22 Jun 2017 24:00:00 EDT

Storage underpins everything from the speed of IT operations to simplifying applications for end-users. Find out why KordaMentha, an Australian investment firm chose to adopt an all-flash array to support data growth and their new hybrid cloud environment, as well as to deliver on new backup initiatives.. Published by: Pure Storage



Overcoming the Human Factor with Visibility-Centric Security

Wed, 21 Jun 2017 24:00:00 EDT

Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity. Published by: Gigamon



Redefining Tape Backup for the Cloud Era

Wed, 21 Jun 2017 24:00:00 EDT

Watch this webcast to learn how you can meet regulatory data archival and retention requirements by adding an AWS cloud storage tier to your existing tape backup system. Published by: StarWind Software Inc.



Is Your IT Security Affecting Your Workforce Productivity?

Tue, 20 Jun 2017 24:00:00 EDT

Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security. Published by: Dell India



Pervasive Visibility Platform – A New Approach to Network Monitoring

Fri, 31 Mar 2017 24:00:00 EDT

Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more. Published by: Gigamon



Redefining Tape Backup for the Cloud Era

Thu, 15 Jun 2017 24:26:34 EDT

Tune into this podcast to learn how you can meet regulatory data archival and retention requirements by adding an AWS cloud storage tier to your existing tape backup system. Published by: StarWind Software Inc.



Redefining Tape Backup for the Cloud Era

Thu, 15 Jun 2017 24:26:40 EDT

Watch this webcast to learn how you can meet regulatory data archival and retention requirements by adding an AWS cloud storage tier to your existing tape backup system. Published by: StarWind Software Inc.



Top 5 Reasons to Choose Dell EMC For Data Protection

Tue, 20 Jun 2017 24:00:00 EDT

Discover 5 ways in which Dell EMC's data protections suite can give your business the enterprise-grade data protection you need to accelerate your digital transformation. Published by: Dell EMC Intel®