Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
data protection  data  dell emc  discover  gdpr  learn  mobile  oracle  paper  protection  published  security  white paper 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Fri, 21 Apr 2017 16:45:14 EDT

Last Build Date: Fri, 21 Apr 2017 16:45:14 EDT

 



Real-time Recovery Architecture as a Service

Fri, 02 Sep 2016 24:00:00 EDT

Read on to learn about purpose batch backup appliances (PBBAs) and how to gain real-time, continuous data protection systems that work at the application memory level and memory speed. Published by: Oracle Corporation



SailPoint-Identity-is-Everything

Fri, 21 Apr 2017 24:00:00 EDT

A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more. Published by: SailPoint Technologies



Security Report: Transaction Monitoring Optimization

Sat, 31 Dec 2016 24:00:00 EST

Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind. Published by: SAS



SAS Solution for Personal Data ProtectionEnabling compliance with new regulation

Fri, 21 Apr 2017 24:00:00 EDT

Failing to comply with the GDPR results in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands. Published by: SAS



Maximizing The Value of Web Application Firewalls

Fri, 29 Apr 2016 24:00:00 EDT

In this white paper, learn some best—practices for managing your web application firewall (WAF) such as 3 basic rules for running your WAF when it's in 'alert mode', why data analytics is key to building an intelligent WAF, and more. Published by: Akamai



SailPoint-Get-Ready-for-GDPR

Fri, 21 Apr 2017 24:00:00 EDT

Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline. Published by: SailPoint Technologies



Are You Ready for New Data Recovery Regulations?

Fri, 25 Nov 2016 24:00:00 EST

With this new data recovery appliance for your Oracle databases, you'll be able to instantly view your unprotected data, and take immediate action with end-to-end block validation. Read on and learn how you can gain rewind and playback abilities, minimization of your unprotected data window, and more. Published by: Oracle Corporation



Cyber Threats: A perfect storm about to hit Europe?

Fri, 21 Apr 2017 24:00:00 EDT

As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals. Published by: ComputerWeekly.com



Do You Know Who Owns Your Data?

Thu, 20 Apr 2017 24:00:00 EDT

Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more. Published by: SailPoint Technologies



How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost

Thu, 20 Apr 2017 24:00:00 EDT

Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more. Published by: Wandera



Manage & Secure Your Mobile Data Effectively

Thu, 20 Apr 2017 24:00:00 EDT

Mobile has been one of the most disruptive forces in business. Enterprises have been scrambling to get the right systems in place to equip employees with the best quality data plans and effectively manage that usage centrally. Learn how to tighten your mobile data security and data usage management. Published by: Wandera



The Ultimate Guide to the CCSP

Thu, 20 Apr 2017 24:00:00 EDT

Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence. Published by: ISC2



A Robust Zero Data Loss Recovery Appliance

Thu, 20 Apr 2017 24:00:00 EDT

Database downtime can lead to data loss, which impacts not only your profits but brand reputation as well. In this infographic learn about a program uniquely designed to protect your Oracle databases. Published by: Oracle Corporation



Information Security magazine Insider Edition, April 2017

Mon, 10 Apr 2017 24:00:00 EDT

Managing identity and access is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Published by: SearchSecurity.com



Employee Monitoring: An Important Security Measure?

Wed, 12 Apr 2017 24:00:00 EDT

Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this. Published by: Veriato, Inc.



Mobile Data Research Report

Wed, 19 Apr 2017 24:00:00 EDT

Mobile data continues to change and grow each year – and because of this frequency of change, it's important to know how your data may be affected. Learn about new mobile threats, compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage, and more. Published by: Wandera



Mitigate Data Loss Exposure and Improve Your Risk Profile

Tue, 21 Feb 2017 24:02:42 EST

Generic disaster recovery approaches for specialized assets can make data recovery difficult or impossible. In this webcast learn about a recovery appliance designed specifically to back up the information on your Oracle databases. Published by: Oracle Corporation



Hackers Share Secrets so You Can Make Their Job Harder

Sat, 31 Dec 2016 24:00:00 EST

Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts. Published by: Thycotic



What New NIST Password Recommendations Should Enterprises Adopt?

Tue, 11 Apr 2017 24:00:00 EDT

Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines. Published by: Specops Software



A Safe Password System? Here's How

Tue, 11 Apr 2017 24:00:00 EDT

Learn the ropes of what makes for more effective password risk management, how to avoid common pitfalls organizations make in implementing password policies, and 3 major risks of password compromise. Published by: Specops Software



Data protection: Not just about personal data and compliance

Tue, 18 Apr 2017 24:00:00 EDT

Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective. Published by: ComputerWeekly.com



Don't Rush into Cloud Databases without a Well-Grounded Plan

Fri, 07 Apr 2017 24:00:00 EDT

In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security. Published by: Data Intensity



7 Factors Driving Proper Encryption Management

Mon, 17 Apr 2017 24:00:00 EDT

Learn 7 key factors in encryption management that are driving ingenuity, bolstering native encryption, unifying management and transforming security. Published by: WinMagic



Make High Availability and Data Protection in Your Storage Environment a Reality

Fri, 30 Sep 2016 24:00:00 EDT

Access this white paper to learn about a scale-out NAS system which provides the high availability and protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data. Discover the growing importance of NAS data protection now. Published by: Dell EMC



POL Makes for a More Advanced Enterprise Network

Fri, 30 Dec 2016 24:00:00 EST

This paper outlines the key elements of an enterprise passive optical LAN and explains why it is a great enterprise network option for tomorrow's digital enterprise. Published by: Nokia



Passive Optical LAN vs. Copper-based Ethernet LAN

Fri, 30 Dec 2016 24:00:00 EST

This paper presents the value of an enterprise passive optical LAN based on a Bell Labs economic analysis, and compares the benefits of an optical network compared to traditional copper-based Ethernet architectures. Published by: Nokia



Dell EMC Data Protection in the Cloud

Fri, 14 Apr 2017 24:00:00 EDT

What if you could get data protection in the cloud ans save on storage costs? Watch this 5 minute video to learn about a service enables you to move data from your data domain platform to another object storage platform. Published by: Dell EMC



Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

Fri, 14 Apr 2017 24:00:00 EDT

This white paper highlights must-have data security features deduplication should encompass. Access this resource now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth. Published by: Dell EMC



Ransomware Detection and Prevention Tools You Need Now

Sun, 05 Mar 2017 24:00:00 EST

Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need. Published by: SearchSecurity.com



Passive Optical LAN: What you're missing out on

Thu, 31 Mar 2016 24:00:00 EDT

In this resource, learn why many companies are letting their copper-based LANs corrode and upgrading to fiber-based LANs. Published by: Nokia



Your In-Depth Guide to GDPR

Tue, 11 Apr 2017 24:00:00 EDT

Gain an overview of what the key objectives of GDPR are, what it means for your organization, and what impact it will have on your business. Published by: Oracle Corporation UK Ltd



Enhance Your Business Performance with Passive Optical LAN

Wed, 07 Dec 2016 24:00:00 EST

Many companies are ditching their copper-based LAN for a passive optical LAN (POL) to meet today's networking requirements. In this short video, learn how POL outperforms archaic LAN tech. Published by: Nokia



Deploying OpenShift container platform 3 on Google cloud platform

Tue, 24 Jan 2017 24:00:00 EST

This guide dives into an in-depth example demonstrating how OpenShift Container Platform 3 can be set up to take advantage of the native high availability capabilities of Kubernetes in order to create a highly available OpenShift Container Platform 3 environment. Published by: Red Hat



How Mobile Application Platform Integration Can Boost Security

Thu, 15 Dec 2016 24:11:19 EST

In this video, learn how you can mitigate security threats across your mobile application platforms by integrating your systems for data on the backend, as well as how middleware applications run in the cloud helps, and more. Published by: Red Hat



Rapid Growth of SSL Encryption

Tue, 11 Apr 2017 24:00:00 EDT

Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more. Published by: Fortinet, Inc.



Top 5 Tips to Accelerate your Hyper-V infrastructure Projects

Tue, 11 Apr 2017 24:00:00 EDT

Looking to complete your Hyper-V infrastructure project under budget Read this webcast transcript as two virtual server experts highlight 5 methods of accelerating your Hyper-V infrastructure projects. You'll also gain security and compliance best practices for protecting your virtual workloads. Published by: Starwind 5nine



Data Replication and Oracle Databases: Top 5 Reasons to Choose SharePlex

Sat, 31 Dec 2016 24:00:00 EST

This white paper takes a closer look at SharePlex, one of your options for data replication in Oracle environments. Uncover the top 5 reasons for considering SharePlex and learn how to optimize database management with a comprehensive and scalable strategy. Published by: Quest



Cyber security in the Middle East

Tue, 11 Apr 2017 24:00:00 EDT

As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks. Published by: ComputerWeekly.com



Focus ASEAN: Security & Digital Transformation

Tue, 11 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally. Published by: ComputerWeekly.com



Q&A: Analyzing DNS Services with Paul Vixie

Tue, 04 Apr 2017 24:00:00 EDT

Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns. Published by: Farsight Security



How to Find the Best DDoS Attack Prevention and Detection Tools

Wed, 05 Apr 2017 24:00:00 EDT

In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy. Published by: SearchSecurity.com



What Changing Mobile Communications Mean for Your Business

Fri, 30 Dec 2016 24:00:00 EST

In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications. Published by: Mitel Networks Limited



Dell EMC Global Data Protection Index: The Global Maturity of Data Protection

Mon, 10 Apr 2017 24:00:00 EDT

In this infographic, learn what 2,200 IT decision makers from 18 countries had to say about their backup and recovery experiences, strategies, and infrastructure. Access now to see where you stand in comparison. Published by: Dell EMC



Effective Information Governance Strategies

Mon, 03 Apr 2017 24:00:00 EDT

In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process. Published by: Iron Mountain



Network Security Trends - Understanding the State of Network Security Today

Tue, 31 Jan 2017 24:00:00 EST

Read this ESG research paper and learn how network security infrastructure, practice, and performance has changed during 2016 Published by: Gigamon



SSL/TLS Decryption: How to Avoid Blind-Spots and Camouflaged Attackers

Mon, 29 Feb 2016 24:00:00 EST

Use this ESG research content to explore why building a strategic approach to SSL/TLS encryption is the best way to work past visibility and vulnerability issues in your network. Then, discover a vendor that might be able to grant you this network access. Published by: Gigamon



New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises

Fri, 26 Aug 2016 24:00:00 EDT

With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines. Published by: Hewlett-Packard Enterprise



Dell EMC Data Protection: Your choice is simple

Fri, 07 Apr 2017 24:00:00 EDT

This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more. Published by: Dell EMC



7 Questions to Achieve GDPR Compliance

Fri, 18 Nov 2016 24:00:00 EST

Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more. Published by: Hewlett-Packard Enterprise



Focus ANZ: Security & Digital Transformation

Fri, 07 Apr 2017 24:00:00 EDT

With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks. Published by: ComputerWeekly.com