Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
cloud  data  dns  guide  iot  learn  machine data  network  published splunk  published  ransomware  security  splunk  wan 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 26 May 2017 15:15:14 EDT

Last Build Date: Fri, 26 May 2017 15:15:14 EDT


FS & GDPR - The Path To Compliance

Tue, 23 May 2017 24:57:34 EDT

In financial services institutions, there are challenges to overcome when it comes to data: An overabundance of customer data, enterprise data governance isn't a widespread practice, and disparate technology to manage data. Learn how complying with the General Data Protection Regulation (GDPR) can help you overcome some of these challenges. Published by: Informatica

Helping Companies Make Sense of Machine Data

Thu, 09 Feb 2017 24:05:29 EST

Watch this interview with Splunk CEO Douglas Merritt, to learn about how his analytics program can help protect your organization by delivering analytics from all sectors of your business, creating a hybrid view of on-prem and cloud systems, and more. Published by: Splunk

Executive summary: Harvey Nash KPMG CIO survey 2017

Wed, 24 May 2017 24:00:00 EDT

This extract from the Harvey Nash KPMG CIO survey 2017 shows how CIOs are managing change and prioritising innovation and digital technology in a time of increasing uncertainty. Published by:

Harnessing Analytics For Security Investigation

Tue, 23 May 2017 24:07:33 EDT

Watch this video to learn how you can harness the power of this analytics software to easily detect anomalies in the endpoint, allowing you to mitigate ransomware before it becomes a problem. Published by: Splunk

Managing Machine Data from POS, IoT, Sensors, and Other Data Sources

Tue, 23 May 2017 24:00:00 EDT

This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security. Published by: Splunk

New MSP Security Options for Office 365

Fri, 12 May 2017 24:00:00 EDT

Discover how Barracuda Networks has taken a more holistic approach to data protection by offering not only backup services, but also specialized email security for Office 365. Published by: Microsoft

Splunk Everywhere! Ransomware

Tue, 23 May 2017 24:01:27 EDT

Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed. Published by: Splunk

Middleware and Operating System Machine Data

Tue, 23 May 2017 24:00:00 EDT

This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more. Published by: Splunk

How Data & Operational Intelligence Drive Public Sector Mission Success

Tue, 23 May 2017 24:00:00 EDT

Operational intelligence is the key to building a truly secure IT environment in the digital age. Use this e-book to learn about the challenges facing operational intelligence in the public sector, a system designed to help you find patterns in your data and put them into context, and more. Published by: Splunk

The Essential Guide to Machine Data

Mon, 06 Mar 2017 24:00:00 EST

This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches. Published by: Splunk

GDPR: Understanding Your Data

Mon, 22 May 2017 24:47:40 EDT

As you prepare to comply with the General Data Protection Regulation (GDPR), you must have a full understanding of the challenges you'll face in order to overcome them smoothly. Join Patrick Dewald and Guiseppe Mura of Informatica to learn how to prepare your company for the GDPR. Published by: Informatica

Computer Weekly:Global Ransomware Attack Could Be a Security Wake-Up Call

Tue, 23 May 2017 24:00:00 EDT

In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management. Published by:

Operationalizing Threat Intelligence for Enterprise Security

Fri, 19 May 2017 24:00:00 EDT

In this white paper, learn about a system designed to help you manage, categorize, and investigate security anomalies based on data that has been automatically collected and aggregated from multiple sources. Published by: Splunk

How to Battle Ransomware as Attacks Increase in Health IT

Fri, 19 May 2017 24:00:00 EDT

IDC Health Insights predicts that ransomware attacks on healthcare orgs will double by 2018. In this e-guide, uncover the top trends for healthcare IT in 2017, and take a closer look at strategies for combatting ransomware attacks with health IT security expert Mark Dill. Published by: Cisco Umbrella

The 6 Essential Capabilities of an Analytics-Driven SIEM

Fri, 19 May 2017 24:00:00 EDT

Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed. Published by: Splunk

Data Protection: Not Just About Personal Data and Compliance

Thu, 18 May 2017 24:00:00 EDT

Despite the focus on data protection, many organizations are still leaving their data wide open for attack. Access this e-guide now to learn if a cloud-based data storage and protection strategy works and is right for you. Published by: Arrow + NetApp

CW Nordics May 2017

Thu, 25 May 2017 24:00:00 EDT

The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more. Published by:

Focus: how to avoid being hit by ransomware

Thu, 18 May 2017 24:00:00 EDT

In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software. Published by:

Monitoring AWS Comes Down to Tool Choice

Fri, 12 May 2017 24:00:00 EDT

AWS is introducing more features and services to make public cloud more easily manageable. This e-guide explores three of those services to help you get your hands around AWS security and resource configurations. Published by: Splunk

Protect Against Ransomware and Ensure Hospital Data Security

Thu, 18 May 2017 24:00:00 EDT

Uncover a Q&A with Keith Jennings, CIO at Mass General Hospital in Boston, and Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System in Ann Arbor, as they discuss essential strategies and technology for preventing ransomware attacks on healthcare organizations. Published by: Cisco Umbrella

How SD-WAN now benefits deployment and app delivery

Wed, 17 May 2017 24:00:00 EDT

Deploying SD-WAN technology can solve a lot of problems in the wide area network, but networking pros still need to do their homework before they buy. This TechTarget guide to SD-WAN deployment has the info you need to pick the right SD-WAN for your organization. Published by:

Choosing an Optimal Solution for DDoS Protection

Wed, 17 May 2017 24:00:00 EDT

Discover which cloud-based DDoS protection could work best for your organization, including on-premise, on-demand, always-on, and hybrid cloud options. Published by: Radware

SD-WAN's Impact on Routers, and Riverbed Upgrades SteelConnect

Thu, 11 May 2017 24:00:00 EDT

This expert e-guide explains how SD-WAN is ending the need for stand-alone enterprise routers and optimization technology in the WAN. Additionally, learn what Riverbed's SD-WAN upgrade means for SteelConnect. Published by: Riverbed Technology, Inc.

Planning Ahead for IoT Deployment Success: Top 5 Tips

Wed, 17 May 2017 24:00:00 EDT

Learn how to plan out your IoT strategy as your organization takes on smart devices, proliferating endpoints, and universal connectivity. Plus, uncover 5 best practices for successful IoT deployments with strong network security and management. Published by: Aruba Networks

GDPR Developments Will Dominate Storage and Compliance in 2017

Thu, 11 May 2017 24:00:00 EDT

In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more. Published by: Arrow + NetApp

The Internet of Relevant Things

Wed, 18 Jan 2017 24:00:00 EST

The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability. Published by: Aruba Networks

Bridging the Gap Between IT Operations & Security

Wed, 17 May 2017 24:00:00 EDT

Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network. Published by: Splunk

Extracting Context From IoT To Create Real Economic Value

Wed, 17 May 2017 24:00:00 EDT

Discover how to unlock data siloes to expose key IoT data to machine learning, analytics, and business intelligence. Learn how to use location-based services to provide a geographical context for your data and improve mobile app strategies in a variety of industries, from retail to healthcare and everything in between. Published by: Aruba Networks

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications

Tue, 16 May 2017 24:00:00 EDT

Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more. Published by: Radware

How to Effectively Manage the Cloud Logs of Security Events

Thu, 11 May 2017 24:00:00 EDT

Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue. Published by: Splunk

The Right Tools Smooth the DevOps Transition

Fri, 12 May 2017 24:00:00 EDT

Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more. Published by: Splunk

Get Your Network and Security Digital-Ready

Tue, 16 May 2017 24:00:00 EDT

This white paper explores how to get your network ready to handle the demands of a digital workplace for modern user experiences, security, and innovation. Learn how to update your enterprise mobility and IoT strategies and uncover 6 steps for prepping your network. Published by: Aruba Networks

2016 Mobile Security & Business Transformation Study

Tue, 16 May 2017 24:00:00 EDT

In this research report, learn how mobile adoption grew and changed in 2016, and how this information can help you secure your apps and devices in the years to come. Published by: IBM

Maximize Productivity with Secure Delivery of Apps to Mobile Devices

Sat, 31 Dec 2016 24:00:00 EST

Explore a simple, secure, and unified way to deliver all types of apps to any device that employees use to execute critical functions. Learn how Citrix NetScaler makes it easy for users to access apps from any device – including mobile platforms like laptops or smartphones – without sacrificing security or increasing complexity. Published by: Citrix

Digital Transformation Requires a New WAN

Sun, 31 Jul 2016 24:00:00 EDT

Find out how to prep your network for the increasing adoption of hybrid cloud environments, mobile, and IoT by replacing managed WAN services and adding internet connectivity. Plus, learn about the benefits of SD-WAN for optimizing app performance, cloud migration, and more. Published by: Citrix

Political Turmoil Threatens Global IT Services Sector

Tue, 16 May 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now. Published by:

Achieve Centralized Visibility and Management for Multivendor Access Networks

Mon, 15 May 2017 24:00:00 EDT

In order to proactively optimize network performance, strengthen network security, and improve end-user experiences, find out how to leverage Aruba AirWave to achieve centralized visibility and control for multivendor access networks. Published by: Aruba Networks

Unified Communication: “It should work as easily as a telephone call!”

Mon, 15 May 2017 24:00:00 EDT

This article in our Royal Holloway Information Security series explains the security implications of unified communication. Published by:

How to Secure Office 365 from Advanced Attacks

Fri, 12 May 2017 24:00:00 EDT

This e-guide details how to protect Office 365 from phishing attempts, defend end users from malicious sites, and more. Published by: Microsoft

Why Outsource your DNS

Fri, 30 Dec 2016 24:00:00 EST

Learn the top four reasons to outsource your DNS in this resource. Published by: Dyn

Policy Management for IoT, Mobile, and Network Security

Fri, 12 May 2017 24:00:00 EDT

With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform. Published by: Aruba Networks

Dyn Secondary DNS

Fri, 01 Jul 2016 24:00:00 EDT

This resource highlights the benefits of adding a secondary DNS to your current DNS infrastructure. Published by: Dyn

SD Wan is the Right Path for Better Branch Network Performance

Tue, 31 May 2016 24:00:00 EDT

If you rely on third-party cloud and SaaS-based apps, traditional WAN might not be able to keep up. Find out how a SD WAN-based approach can cut down on unnecessary traffic and help users access the apps they need more efficiently. Published by: Citrix

The Number 1 Question You Should Ask Any Potential DNS Vendor

Fri, 30 Dec 2016 24:00:00 EST

Learn the number one question you should ask any potential DNS vendor to ensure you employ a managed DNS that improves Internet performance, user experiences and business results. Published by: Dyn

The EU General Data Protection Regulation (GDPR): A Pocket Guide

Fri, 12 May 2017 24:00:00 EDT

Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more. Published by: DataStax

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

Fri, 05 May 2017 24:00:00 EDT

Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider. Published by: Nerdio

Rethink DNS

Fri, 30 Dec 2016 24:00:00 EST

This e-book details why you need to rethink DNS from several different perspectives, including your DNS choices, the importance of DNS for digital resilience and the overall value you place on DNS. Published by: Dyn

Countering Evolving Cybersecurity Challenges

Mon, 23 Jan 2017 24:00:00 EST

Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms. Published by: Fortinet, Inc.

Digital Transformation and Network Security

Tue, 31 Jan 2017 24:00:00 EST

In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges. Published by: Forcepoint

Testing NGFW: Three Points of Value Critical to your Enterprise

Thu, 11 May 2017 24:47:46 EDT

In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more. Published by: Forcepoint