Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
backup  cloud  data protection  data  enterprise  information  learn  mobile  protection  published  security  white paper  white 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 24 Mar 2017 16:35:20 EDT

Last Build Date: Fri, 24 Mar 2017 16:35:20 EDT


Webcast: Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace

Tue, 14 Mar 2017 24:00:00 EDT

In this webcast, security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel discuss the technical and operational security concerns of modern networks. Published by: Hewlett Packard Enterprise

Dell EMC Data Protection Suite Enterprise Edition Solution Specifications

Fri, 24 Mar 2017 24:00:00 EDT

Inside learn about what you can gain by adopting the Dell EMC Data Protection Suite Enterprise Edition Published by: Dell and Microsoft

Discover What 9 Data Center Backup and Recovery Programs Have to Offer You

Wed, 08 Jun 2016 24:00:00 EDT

Access this Gartner research report to see stacked up 9 enterprise backup vendors, as well as discover some cautions you should be aware of when choosing new backup software. Published by: IBM

Cloud Backup Options to Protect Public Cloud Storage Data

Tue, 21 Mar 2017 24:00:00 EDT

Learn how and when to implement backups in the public cloud in this expert e- guide. Inside explore 3 backup options for the public cloud, the difference between traditional and appliance cloud backups, and more. Published by: Druva Software

A Data Protection Suite for Archive Solution Specification

Thu, 23 Mar 2017 24:00:00 EDT

In this white paper, learn about a 5 individual security suites designed to solve a broad spectrum of data protection issues. Published by: Dell and Microsoft

Information Governance: Protect Your Company's Assets

Wed, 22 Mar 2017 24:00:00 EDT

This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept. Published by: Box

Keeping Your Office 365 Implementation Secure and Effective

Fri, 03 Mar 2017 24:00:00 EST

In this webinar, learn how to handle security concerns in your Office 365 deployment. Also learn how to best address your content management needs before, during, and after Office 365 transition, and what you can do to help your employees make the most of the suite's features. Published by: Box

Data Governance: Embracing Security and Privacy

Tue, 21 Mar 2017 24:00:00 EDT

With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy. Published by: Tealium

Hybrid Cloud Storage Strategies

Thu, 22 Sep 2016 24:00:00 EDT

Hybrid cloud is the storage option that gives customers the flexibility and scalability they need at the cost they want, but needs to be properly managed for you to realize any of these benefits. Watch this brief interview to learn about hybrid cloud storage strategies and how to make the most of your cloud investment. Published by: IBM

Combat Today's Threats with A New Approach to Security

Tue, 21 Mar 2017 24:00:00 EDT

An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way. Published by: Fortinet, Inc.

Mobile device Management - Keep up with your mobile workforce

Thu, 26 Nov 2015 24:00:00 EST

Discover a device manager that has combined EMM and software asset management to minimize the impact of mobility on the service desk and deliver a safe environment for employees to use sensitive information and apps on mobile devices. Published by: Snow Software

How To Limit Privileged Accounts And Boost Security

Wed, 15 Mar 2017 24:00:00 EDT

Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts. Published by: Devolutions

5 Steps To Defining Your Data Retention Policies

Wed, 13 Jan 2016 24:00:00 EST

Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps. Published by: Iron Mountain

Cloud Storage and Backup for Long-Term Data Retention

Fri, 17 Mar 2017 24:00:00 EDT

In this data sheet learn about a cloud-based backup program that offers long-term retention of backup copies, multiple plans to fit your budget and security needs, and more. Published by: Dell and Microsoft

Understanding the IoT Explosion and Its Impact on Enterprise Security

Thu, 16 Mar 2017 24:00:00 EDT

Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more. Published by: Fortinet, Inc.

2017 Analyst Report for Application Security Testing

Thu, 16 Mar 2017 24:00:00 EDT

In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams. Published by: IBM

Deploying an Adaptable NFV Infrastructure

Fri, 30 Dec 2016 24:00:00 EST

Network functions virtualization (NFV) helps communications service providers take advantage of new market opportunities faster and more efficiently while cutting costs and preparing their infrastructure for the future. In this short white paper, learn how to deploy NFV and provide your organization with increased infrastructure performance. Published by: Red Hat

FI-TS Provides SAP in the Cloud Securely with Enterprise Virtualization

Wed, 30 Apr 2014 24:00:00 EDT

How can an IT service provider for the financial and insurance industry provide the most up-to-date services to ensure that clients meet both regulatory and customer expectations? Access this case study to learn how one IT outsourcicng partner was able to reduce costs while optimizing processes with cloud technology. Published by: Red Hat

How to Achieve Stronger Information Security

Mon, 25 Jan 2016 24:00:00 EST

Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security. Published by: Iron Mountain

The Future of Privileged Management: Understanding the Bigger Picture

Thu, 08 Dec 2016 24:00:00 EST

Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management. Published by: One Identity

Investing in the Data Center to Meet Modern Customer Demands

Wed, 07 Dec 2016 24:00:00 EST

Data center modernization is one way to boost digital transformation and innovation efforts. Read on to see what Forrester found in their research on how organizations are going about their modernization, the benefits they are realizing, and more. Published by: Red Hat

Focus ANZ: Enterprise Mobility

Thu, 16 Mar 2017 24:00:00 EDT

With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient. Published by:

Focus ASEAN: Enterprise Mobility

Thu, 16 Mar 2017 24:00:00 EDT

With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient. Published by:

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts

Wed, 15 Mar 2017 24:00:00 EDT

This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities. Published by:

How Enterprise Security Leaders are Now Forced to Address Top Security Threats

Wed, 15 Mar 2017 24:00:00 EDT

Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose. Published by: Fortinet, Inc.

Your Guide to the Threat Landscape

Wed, 15 Mar 2017 24:00:00 EDT

Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence. Published by: Fortinet, Inc.

Cyber-physical attacks: Dawn of a new age in cyber-warfare?

Tue, 14 Mar 2017 24:00:00 EDT

This article in our Royal Holloway Security Series explores the application of cyber power in international relations Published by:

Ransomware guide

Tue, 14 Mar 2017 24:00:00 EDT

Learn how to defend your organization from ransomware with an advanced security model, utilizing next-generation firewalls, layered security, and proactive threat intelligence. Published by: Fortinet, Inc.

Identify and Manage Fraud Better with Analytics

Tue, 14 Mar 2017 24:00:00 EDT

This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors. Published by: BAE Systems

Making Hybrid Cloud Replication Work for You

Mon, 13 Mar 2017 24:00:00 EDT

In this white paper, learn how the hybrid cloud infrastructure is perfectly designed for disaster recovery and data protection, as well as why this might be the right choice for your enterprise. Published by: Quest

How mobile remote desktop apps work

Fri, 10 Mar 2017 24:00:00 EST

Mobile remote desktop apps can be an important tool for mobile workers. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work. Published by: LogMeIn Rescue Lens

5 Cornerstones to Devising Your Backup & Continuity Defense

Mon, 13 Mar 2017 24:00:00 EDT

Inside, learn 5 cornerstones to devising your single-point backup and continuity defense plan. Published by: Unitrends

Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

Tue, 14 Mar 2017 24:00:00 EDT

In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now. Published by:

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup

Mon, 13 Mar 2017 24:00:00 EDT

Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more. Published by: Unitrends

Sleeping Android: the danger of dormant permissions

Mon, 04 Mar 2013 24:00:00 EST

This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. Published by:

How To Recover Data From Server Failure

Mon, 13 Mar 2017 24:00:00 EDT

When a server fails, you need data restored in minutes rather than hours in order to minimize the impact to the business. Inside this technical brief, learn about a tool by Quest that can help you recover data and apps from a server failure in a few simple steps. Published by: Quest

Take a Cloud First Approach to Modernize Data Protection

Mon, 13 Mar 2017 24:03:11 EDT

Traditional backup systems are no longer affordable, nor flexible enough for the modern business. Learn how you can streamline your backup and recovery programs while lowering TCO with the cloud thanks to this section of our site dedicated to helping you save costs and improve business agility with cloud-based data protection. Published by: Druva Software

Secure Mobile Access for BYOD

Fri, 30 Dec 2016 24:00:00 EST

Bring-your-own-device (BYOD) initiatives carry inherent risks. And securing BYOD with layers of disparate technologies can create security gaps. This e-book explores how converged tools can ensure mobile workforce management and mobile security management. Published by: SonicWall

CW ASEAN March 2017: Raising national security standards

Thu, 09 Mar 2017 24:00:00 EST

In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems. Published by: TechTarget ANZ

CW ANZ March 2017: Take cover from cyber threats

Thu, 09 Mar 2017 24:00:00 EST

In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance. Published by: TechTarget ANZ

Multiple Cloud Connectivity and Recovery Options Gives This Backup Software A Leg-Up

Mon, 31 Oct 2016 24:00:00 EDT

While backing your data up is crucial, it means nothing if you don't have a way to recover that information quickly and easily. In this white paper, learn about a program that lets you do just that, as well as the flexibility to restore VMs to different hypervisors, multiple physical and virtual restore options. Published by: Quest

The Different Types of Cyber-Attacks and How to Prevent Them

Fri, 30 Dec 2016 24:00:00 EST

This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more. Published by: SonicWall

A Massively Scalable Approach to Network Security

Fri, 30 Dec 2016 24:00:00 EST

This white paper details a better approach to network security: an innovative network-based model for massively scaling a next-generation firewall that can address today's network needs and provide increased performance, higher resiliency and lower TCO. Published by: SonicWall

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race

Tue, 31 Jan 2017 24:00:00 EST

This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond. Published by: SonicWall

THE SILVER LINING - Protecting Corporate Information in the Cloud

Fri, 10 Mar 2017 24:00:00 EST

In this quick infographic discover the hard numbers on how to protect corporate information in the cloud, and how the numbers of companies not embracing the cloud is shrinking. Published by: Symantec & Blue Coat Systems

Eight Ways to Protect Your Network Against Ransomware

Fri, 30 Dec 2016 24:00:00 EST

This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals. Published by: SonicWall

Combine Flash Systems With Hyper-Converged Infrastructure to Better Backup Your Data

Fri, 10 Mar 2017 24:00:00 EST

In this expert-guide, learn how data protection systems have adapted to support hyper-convergence, and how hyper-convergence can be used to better archive your information. Then, read a little about why you may want to consider moving your organization to a flash backup system. Published by: Cohesity

The Benefits of Public Cloud for Data Protection

Fri, 10 Mar 2017 24:00:00 EST

Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection. Published by: Quest

Hackers Have a Plan to Get to Your Privileged Accounts

Fri, 10 Mar 2017 24:00:00 EST

Gain a detailed walk through of the challenges of managing privileged accounts, and the importance of project planning and getting up-front buy-in from key stakeholders to ensure a successful implementation. Published by: One Identity

Strategies to Ensure Success for your Privileged Management Project

Fri, 10 Mar 2017 24:00:00 EST

Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts. Published by: One Identity