Subscribe: Most Popular White Papers and WebcastsSecurity Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
attacks  barracuda networks  cloud  data  discover  enterprise  learn  mobile  networks  published barracuda  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Thu, 20 Oct 2016 20:10:18 EDT

Last Build Date: Thu, 20 Oct 2016 20:10:18 EDT


Security & Management for your Mobile Data

Thu, 20 Oct 2016 24:00:00 EDT

Discover how to gain a multi-level security architecture, both on device and in the cloud, working in real-time to provide insights into your mobile data that goes beyond MDM. Published by: Wandera

Mobile Data Report 2016

Sat, 30 Apr 2016 24:00:00 EDT

Find an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Find significant new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage. Published by: Wandera

Mobile Security: Gain Real-Time Threat Prevention

Thu, 20 Oct 2016 24:00:00 EDT

Learn how to gain real-time threat prevention, compliance and data cost management for mobile devices. Discover how to block threats such as data leaks, malware, and man-in-the-middle attacks, responding with real-time policy enforcement. Published by: Wandera

Top Phishing Attacks: Discovery and Prevention

Thu, 20 Oct 2016 24:00:00 EDT

Learn the behaviors of, and remedies for, phishing attacks that are targeting enterprises in ever increasing numbers. Published by: Agari

Put Endpoint Security in Capable Hands

Thu, 20 Oct 2016 24:00:00 EDT

Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure. Published by:

Data Centers in the Crosshairs: Today's Most Dangerous Security Threats

Thu, 20 Oct 2016 24:00:00 EDT

Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure you're enterprise isn't their next victim. Published by: A10 Networks

Provide the Ideal Frontline Firewall Defense

Thu, 20 Oct 2016 24:00:00 EDT

Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats. Published by: Barracuda Networks

Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

Thu, 20 Oct 2016 24:00:00 EDT

Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs. Published by: Barracuda Networks

The Business Value of Printer Security

Mon, 30 Nov 2015 24:00:00 EST

This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more. Published by: HP

Case Study: i-Virtualize Builds an Agile Architecture with VersaStack

Fri, 28 Aug 2015 24:00:00 EDT

i-Virtualize, a cloud MSP, decided to implement a pre-integrated infrastructure stack that would provide them with the flexibility and versatility necessary to respond quickly and efficiently to customers' changing business needs. Witness how this agile architecture can increase your infrastructure's efficiency while reducing your TCO and risk. Published by: IBM

Your Guide to Trusted Backup and Recovery Software Solutions

Thu, 20 Oct 2016 24:00:00 EDT

Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations. Published by: IBM

2016 Mobile Security & Business Transformation Study

Thu, 20 Oct 2016 24:00:00 EDT

Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility. Published by: IBM

10 Critical Requirements for Optimizing Application Delivery

Wed, 19 Oct 2016 24:00:00 EDT

Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more. Published by: A10 Networks

How IAM Can Address Unstructured Content Security Risks

Tue, 18 Oct 2016 24:00:00 EDT

In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise. Published by: IBM

Barracuda NextGen Firewall Advanced Threat Detection

Fri, 30 Sep 2016 24:00:00 EDT

Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics. Published by: Barracuda Networks

Your Guide to Business Email Compromise

Wed, 19 Oct 2016 24:00:00 EDT

Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails. Published by: Agari

Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

Fri, 30 Sep 2016 24:00:00 EDT

Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training. Published by: Barracuda Networks

Your Guide to Fraudulent Invoice Email

Wed, 19 Oct 2016 24:00:00 EDT

In this webcast, learn how to combat targeted attacks, spear-phishing, and malicious emails dressed up to look and sound legitimate. Published by: Agari

Bridging The Gaps in Mobility Decision Making

Fri, 29 Jul 2016 24:00:00 EDT

This white paper explores the factors that led to the current, complex state of enterprise mobility and examines the Secure Mobile Gateway (SMG) as a solution to regain control of enterprise mobility. Published by: Wandera

How to Segment Cloud Workloads for Better Security

Tue, 18 Oct 2016 24:00:00 EDT

Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge. Published by: IBM

Getting a Grip on Content: Empowered Content Collaboration in the Cloud

Thu, 31 Dec 2015 24:00:00 EST

Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation. Published by: IBM

The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

Fri, 30 Sep 2016 24:00:00 EDT

In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months. Published by: A10 Networks

Barracuda Backup

Tue, 19 Jul 2016 24:00:00 EDT

This video explores how you can take a flexible approach to backup and recovery planning. Find out how to implement cloud-connected, appliance and software-based data protection strategies with high-speed recovery performance. Published by: Barracuda Networks

DDoS Prevention For Attacks That Bypass DNS Rerouting

Tue, 18 Oct 2016 24:00:00 EDT

In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle. Published by: Radware

Printer and Embedded Device Security

Fri, 01 May 2015 24:00:00 EDT

Many printers and embedded devices fail to meet today's enterprise security needs. Uncover five key security capability categories that should be addressed in order to ensure hackers aren't exposing these weak links. Published by: HP

Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

Wed, 19 Oct 2016 24:00:00 EDT

This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more. Published by: Barracuda Networks

Using DNS Monitoring to Detect Network Breaches

Mon, 17 Oct 2016 24:00:00 EDT

Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests. Published by: Dyn

Trustwave Secure Web Gateway Cloud for the Financial Industry

Fri, 30 Sep 2016 24:00:00 EDT

Discover how to get superior protection, control and visibility from your cloud security platform. Allow security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere. Published by: Trustwave

Top Drivers Behind Desktop Virtualization Adoption

Fri, 14 Oct 2016 24:00:00 EDT

IT admins usually list several reasons why they use desktop and app virtualization, but one thing they can almost all agree on is that these technologies simplify management. This e-guide highlights TechTarget's Desktop Virtualization Survey detailing the top drivers of desktop and app virtualization. Published by: Dell, Microsoft and Citrix

Uncovering the True Costs of Enterprise Mobility

Tue, 18 Oct 2016 24:00:00 EDT

This report explores the essential findings of a TCO analysis in 5 key areas of cost, including hardware, IT resources, security, and 2 more. Access now to find out how to take a more holistic approach to calculating the TCO for enterprise mobility and defending against the associated security risks. Published by: Wandera

Why You Need to Test All Your Cloud, Mobile and Web Applications

Wed, 31 Dec 2014 24:00:00 EST

This white paper addresses the importance of complete application testing and gives you recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment. Published by: Trustwave

Is Your Data Secure?

Fri, 29 Jul 2016 24:00:00 EDT

Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy. Published by: Commvault

Strategic Mobility: Making The Most Of Connected Manufacturing

Tue, 18 Oct 2016 24:00:00 EDT

If you want to introduce smart technologies to your organization, this resource will help you get started. Find out how real-time sensor data can help you automate processes, enable predictive processes, enhance customer interactions, and more. Published by: Red Hat

Stop Malware Before It Stops You

Tue, 31 Dec 2013 24:00:00 EST

Detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways. Published by: Trustwave

Enterprise Apps OWASP Mobile Security Risks Report

Tue, 31 May 2016 24:00:00 EDT

This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps. Published by: Wandera

Best-of-Breed Next-Generation Security For the Mid-Market

Fri, 30 Sep 2016 24:00:00 EDT

Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats. Published by: Barracuda Networks

Content Security in the Cloud Era

Fri, 30 Sep 2016 24:00:00 EDT

Discover a cloud-based approach to content filtering and other benefits for network user and administrators. Learn the most effective new approaches to cloud security in the face of the changing security landscape. Published by: Barracuda Networks

Masergy's Unified Enterprise Security Solution

Tue, 18 Oct 2016 24:00:00 EDT

This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency. Published by: MASERGY

Making the Case for Converging Enterprise Mobility and IoT Digital Initiatives

Mon, 29 Feb 2016 24:00:00 EST

This Pathfinder report focuses on two digital initiatives largely viewed as discrete but that share high potential: Enterprise mobility and Internet of Things. Learn how these two initiatives can help unlock the full potential of digital transformation for your enterprise. Published by: Red Hat

Forrester Report on The Total Economic Impact of Agari Customer Protect

Sun, 31 Jul 2016 24:00:00 EDT

This Forrester research content explores how 4 enterprises were able to stop phishing attacks by establishing an authentication loop to ensure only verified emails reached consumers. Learn how they were able to lower the cost of cybersecurity insurance, reduce the need for customer support, and increase customer engagement by 10%. Published by: Agari

Backup and Disaster Recovery Strategies for NAS

Tue, 18 Oct 2016 24:00:00 EDT

This white paper explores how to overcome the limitations of NAS backup and recovery. Find out how to implement a cloud-connected, powerful data protection strategy for NAS systems. Published by: Barracuda Networks

Top 5 Applications You Should Blacklist Now

Tue, 18 Oct 2016 24:00:00 EDT

Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software. Published by: Thycotic

Cloud-Based Backup and Recovery: Virtual Appliance Deployment

Tue, 18 Oct 2016 24:00:00 EDT

This white paper explores how to deploy a cloud backup strategy on various VMware and Microsoft platforms. Discover how to create a powerful, cloud-integrated backup and recovery environment that helps to simplify IT. Published by: Barracuda Networks

CW Middle East Oct to Dec 2016

Thu, 20 Oct 2016 24:00:00 EDT

In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world. Published by:

When Your IAM Policy Encounters the Internet of Things

Wed, 12 Oct 2016 24:00:00 EDT

Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company. Published by: Unisys

The Security Risks of Network Sensors in the Enterprise

Tue, 11 Oct 2016 24:00:00 EDT

In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets. Published by: IBM

The Incident Response Makeover Guide

Mon, 17 Oct 2016 24:00:00 EDT

Learn how to make over stalled-out incident response programs with SOC automation, utilize advanced behavior analytics, and amplify the power of your security analysts in order to reap the benefits of boosted ROI, data loss prevention, and lightning-fast incident response. Published by: Exabeam

Complete Email Protection, Delivered in the Cloud

Fri, 30 Sep 2016 24:00:00 EDT

How do you eliminate email threats before they reach the network? Access now to learn how you can use the cloud to achieve advanced protection against modern email threats and in-depth data security and compliance management. Published by: Trustwave

Trustwave Managed Security Testing - DON’T GUESS. TEST.

Fri, 30 Sep 2016 24:00:00 EDT

Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives. Published by: Trustwave

Backup, Archiving, and Recovery Tools for Large Volume Data

Mon, 17 Oct 2016 24:00:00 EDT

This white paper explores viable backup and recovery options, ranging from tape backups to cloud-based technology. Discover how to implement a complete, cloud-integrated strategy for protecting data in physical, virtual, and SaaS environments. Published by: Barracuda Networks