Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
app  backup  case study  cloud  data  discover  guide  learn  management  mobile  published ibm  published  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 17 Feb 2017 17:50:14 EST

Last Build Date: Fri, 17 Feb 2017 17:50:14 EST


Taking a Proactive Approach to Addressing Ransomware

Wed, 08 Feb 2017 24:47:20 EST

Learn from a panel of IT experts about the dangers ransomware can pose to your enterprise in this webcast. Then, listen as they discuss strategies for mitigating the damage that ransomware can cause. Published by: AttackIQ

Sizing up Oracle Upgrades: Exadata with Oracle Database 12c

Fri, 10 Feb 2017 24:00:00 EST

In this expert e-guide, 20-year industry veteran Brian Peasley explores the top 10 reasons for upgrading Oracle databases to 12c. Discover how DBAs can improve their management of Oracle systems and how Oracle Exadata Database Machine enables analytics, batch, reporting, and other tasks to run simultaneously across databases. Published by: Oracle

App Delivery Controllers: Consistent Management for both Traditional and Microservices Apps

Fri, 10 Feb 2017 24:00:00 EST

As DevOps and microservices speed up development and innovation, your network needs to be able to keep up while still delivering services for your traditional apps and systems. Watch this brief video to learn how to bridge this gap with app delivery controllers (ADCs) to provide consistent management capabilities. Published by: Citrix

Implementing App Security Efficacy and Centralized, Intelligent Threat Management

Fri, 10 Feb 2017 24:00:00 EST

This brief video explores how to implement app security efficacy for centralized threat management both on-premise and in the cloud. Discover how to leverage a web app firewall, defend against threats on the app, infrastructure, and network levels, create stronger identity and access management, and enable real-time threat analytics. Published by: Citrix

Enterprise Mobile Device Management: SJ Case Study

Sat, 31 Dec 2016 24:00:00 EST

This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more. Published by: Snow Software

How to Manage Mobile Devices, Apps, and Content Simply and Securely

Thu, 16 Feb 2017 24:00:00 EST

Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security. Published by: IBM

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity

Thu, 16 Feb 2017 24:00:00 EST

The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more. Published by: IBM

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era

Thu, 16 Feb 2017 24:00:00 EST

Explore what considerations should drive app delivery controller (ADC) management to navigate the increasing complexities of planning for change and digital transformation. Discover how to boost your app delivery strategy and network management by harnessing the power of the cloud to adapt to hybrid environments and microservice architectures. Published by: Citrix

Busting the Myth of the Malware “Silver Bullet”

Thu, 16 Feb 2017 24:00:00 EST

This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats. Published by: Intel Security

What you should know: Hot data backup techniques and trends

Mon, 13 Feb 2017 24:00:00 EST

One of the new data backup techniques fundamentally changing the way people recover from a storage system failure is recovery-in-place. Discover best use cases and how to fully leverage recovery-in-place. Read on to learn six more business continuity management system trends shaping the industry. Published by: Hedvig Inc

Backup target features expand use cases and evolve for better data protection

Mon, 13 Feb 2017 24:00:00 EST

Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance. Published by: Hedvig Inc

EMM with Centralized, Secure Control: Garuda Indonesia Case Study

Sat, 31 Dec 2016 24:00:00 EST

This case study explores how Garuda Indonesia implemented a more comprehensive enterprise mobility management (EMM) strategy. Discover how they streamlined management of mobile devices, managed iPads, apps, and content centrally and securely, leveraged SaaS to reduce costs, and boosted productivity by up to 50%. Published by: IBM

Cloud-Based Mobile Management: The Fundraising People (TFP) Case Study

Sat, 31 Dec 2016 24:00:00 EST

Explore how The Fundraising People replaced their legacy mobility management with a more comprehensive cloud-based platform that increases employees' access to apps and data without sacrificing security. Discover how they unlocked greater control and visibility of mobile devices, all while increasing staff productivity and enabling faster logins. Published by: IBM

How to Sell Disaster Recovery

Sat, 31 Dec 2016 24:00:00 EST

Selling disaster recovery can be tough, so click inside this e-book to learn some strategies for reaching your customers, like, deciding which pricing model is best for you, how to create a solid sales-pitch, and more. Published by: Solarwinds N-able

3 Ways You Can Sell More Backup to Your Customers

Sat, 31 Dec 2016 24:00:00 EST

While every business needs a backup program, many smaller businesses have been hesitant to adopt a program for fear that it will be either too small or too large for their needs. You need to be able to bridge that divide. Read on to learn 3 steps that you can adopt to sell more backup and recovery systems to SMBs. Published by: Solarwinds N-able

Cloud Managed Services: A Comparison Guide

Thu, 30 Jun 2016 24:00:00 EDT

Access this white paper to learn what to ask for in a managed cloud service providers. Use this as a guide to understand what you need, why you need it, and how to go about choosing the right partner. Published by: Hewlett-Packard Enterprise

Manage Application Security Risks to Help Protect your Organization’s Critical Data

Tue, 14 Feb 2017 24:00:00 EST

Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets. Published by: IBM

Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability

Mon, 13 Feb 2017 24:00:00 EST

Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks. Published by: Dyn

Leverage On-Demand Testing with Vulnerability Analytics

Mon, 13 Feb 2017 24:00:00 EST

Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more. Published by: IBM

How to Keep Your Data Secure In An Increasingly Insecure World

Sun, 01 Nov 2015 24:00:00 EDT

Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more. Published by: Micron

Tackling Insider Threats

Wed, 30 Nov 2016 24:00:00 EST

Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats. Published by: Intel Security

Computer Weekly – 14 February 2017: Under surveillance – what the Investigatory Powers Act means for business

Tue, 14 Feb 2017 24:00:00 EST

In this week's Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a "snoopers' charter" that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the public cloud and storage. Read the issue now. Published by:

6 Questions Every CIO Should Ask About Cloud Security

Fri, 10 Feb 2017 24:00:00 EST

Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them. Published by: IBM

Building Trust in a Cloudy Sky

Tue, 31 Jan 2017 24:00:00 EST

90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky." Published by: Intel Security

IDC Analyst Connection: Internal Segmentation Firewalls

Fri, 31 Jul 2015 24:00:00 EDT

Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network. Published by: Fortinet, Inc.

Simplify and Accelerate Identity Protection on The Cloud

Tue, 30 Jun 2015 24:00:00 EDT

Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM. Published by: IBM

Navigating the Data Center: Building a Shutdown Procedure and New Networking Architecture

Mon, 06 Feb 2017 24:00:00 EST

Although policy and process are critical for modern IT, data center admins are often unprepared to shut off things when the need arises. Download now to conceive and test a proper data center shutdown procedure; you'll also discover how to navigate the troubles modern data center networking architectures pose. Published by: Hewlett Packard Enterprise

Britannia Hotels Protects Sensitive Customer Data and Stays Compliant

Thu, 09 Feb 2017 24:00:00 EST

In this case study, learn how Britannia Hotels met new PCI DSS compliance standards without overburdening their organization or fundamentally changing the way they do business. Published by: OpenText

How to Prepare for Out-of-Control Data Growth

Thu, 09 Feb 2017 24:00:00 EST

If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros. Published by: Micron

WP IFSW Global Network Survey results

Mon, 22 Aug 2016 24:00:00 EDT

Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers Published by: Fortinet, Inc.

Understanding What Matters Most When Selecting Managed DNS

Thu, 09 Feb 2017 24:00:00 EST

In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider. Published by: Dyn


Thu, 09 Feb 2017 24:00:00 EST

When DNS underperformance means a dent in revenue, customer satisfaction, and employee productivity, what can you do? Access this white paper to learn how to ensure your most critical applications remain available on the web and that end users reach those applications faster than with any other solution. Published by: Dyn

How to Plan Your Hybrid Cloud Backup Strategy

Mon, 06 Feb 2017 24:00:00 EST

Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy. Published by: Colospace Inc.

Top 10 Reasons Quorum Beats the Competition

Wed, 08 Feb 2017 24:00:00 EST

Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition. Published by: QuorumLabs Inc.

10 Reasons to Upgrade to Oracle Database 12c

Wed, 08 Feb 2017 24:00:00 EST

Let Brian Peasland, a DBA with over 20 years of experience, explains why you should upgrade to Oracle Database 12c. Learn about how you can gain increased back-end support, updated hardware and OS, security patches and more inside. Published by: Oracle

A Computer Weekly Buyer's Guide to Internet of Things Security

Tue, 07 Feb 2017 24:00:00 EST

In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan. Published by:

Deploying a Multi‐Gigabit Web Filtering Architecture

Sat, 31 Dec 2016 24:00:00 EST

This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites. Published by: ContentKeeper

One‐to‐One Computing: A Roadmap to Success

Sat, 31 Dec 2016 24:00:00 EST

Access this white paper to learn more about large-scale mobile device management strategies and uncover the 10 keys to one-to-one computing success. Published by: ContentKeeper

Preventing Ransomware: Healthcare CIO Discusses Top Technologies

Thu, 02 Feb 2017 24:00:00 EST

In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them. Published by: Cisco

A Comprehensive Guide to Disaster Recovery Planning and Testing

Fri, 03 Feb 2017 24:00:00 EST

Circumstances surrounding disaster recovery (DR) have become more complex and difficult to get a handle on in recent years. Discover how DR testing can prevent major outages, and learn 15 proven best practices for disaster recovery testing. Also learn how you can improve DR planning in the cloud. Published by: Zerto

Data Restoration

Tue, 07 Feb 2017 24:00:00 EST

This data sheet provides information on a solution that enables you to restore the data you need from archive or legacy back-up tapes quickly and easily. Published by: Iron Mountain

Use a web app firewall to halt app attacks

Sun, 05 Feb 2017 24:00:00 EST

Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF. Published by:

Modernize Cybersecurity with Hadoop Data Management and Analytics

Sat, 31 Dec 2016 24:00:00 EST

Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics. Published by: Cloudera

Streaming Malware Defense: High Speed Bridge-Based Anti‐Virus Gateway

Sat, 31 Dec 2016 24:00:00 EST

This white paper explores how to implement better web security and web filtering strategies for both desktop and mobile devices. Discover how to keep up with high speed, bridge-based malware defense systems. Published by: ContentKeeper

Take Control of the Cloud: How to Accelerate, Simplify, and Deliver

Fri, 30 Dec 2016 24:00:00 EST

Watch this video to learn how to simplify application lifecycle management across multiple data centers, private clouds, managed private clouds, and public clouds. Additionally, discover how to deliver hybrid IT as a service, so that users get on-demand experiences, while IT gets governance, visibility, and control. Published by: Cisco Systems, Inc.

Lowering Business Risk with Data

Tue, 07 Feb 2017 24:00:00 EST

Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data. Published by: Cloudera

How the Houston Astros Protected their Network from Internet Threats

Sat, 31 Dec 2016 24:00:00 EST

Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic. Published by: ContentKeeper

Methods for Preventing Hospital Ransomware Infections and Cyberattacks

Thu, 02 Feb 2017 24:00:00 EST

The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks. Published by: Cisco

Cloud Security and Content Management: Box Case Study

Mon, 06 Feb 2017 24:00:00 EST

Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe. Published by: IBM

Move Beyond Backup Towards the Ultimate Goal of IT Resilience

Fri, 30 Sep 2016 24:00:00 EDT

Explore this white paper to learn about cloud's expanding role in data backup and disaster recovery, as well as overall business continuity. Published by: Zerto