Subscribe: Most Popular White Papers and WebcastsSecurity Research
http://bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
access  cloud  data protection  data  discover  learn  management  mobile  published bitglass  published  security  software 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSecurity Research

Most Popular White Papers and Webcasts Security Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Thu, 01 Dec 2016 14:05:18 EST

Last Build Date: Thu, 01 Dec 2016 14:05:18 EST

 



What is "Shadow IT" and How to Reduce It

Mon, 31 Oct 2016 24:00:00 EDT

Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more. Published by: Globalscape



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 17 Nov 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



How Virtualization is Transforming Technology Delivery in Healthcare

Thu, 01 Dec 2016 24:00:00 EST

Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Download this resource as leaders from the nation's leading health systems demonstrate how application virtualization is reshaping care delivery and improving security. Published by: Citrix and Pure Storage



Reasonable Security Best Practices: Learning From Notable Data Breaches

Mon, 28 Nov 2016 24:00:00 EST

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition? Published by: Global Knowledge



5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veritas

Wed, 30 Nov 2016 24:00:00 EST

Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision. Published by: Commvault



Trends in Mobile User Authentication

Thu, 01 Dec 2016 24:00:00 EST

Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more. Published by: HID



Build A Strong Data Foundation With A Scalable Relational Database

Thu, 01 Dec 2016 24:00:00 EST

Investigate the resources provided on the pages of this flipbook to discover a relational database program that is able to provide a secure environment for real-time analytics that you can scale to fit your business needs. Published by: IBM



Dedicated to Information Security: The High-Stakes Role of the CISO

Thu, 01 Dec 2016 24:00:00 EST

Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead. Published by: SearchSecurity.com



Important Modern Trends in Digital Banking

Wed, 30 Nov 2016 24:00:00 EST

Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more. Published by: HID



The Threat Lifecycle Management Framework

Wed, 30 Nov 2016 24:00:00 EST

You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.) Published by: LogRhythm, Inc.



CW ANZ - December 2016

Wed, 30 Nov 2016 24:00:00 EST

In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads. Published by: SearchDataCenter.com



8 Decisive Factors For A Successful Employee Engagement Program

Fri, 29 Apr 2016 24:00:00 EDT

Employee engagement programs help both the employee and the organization, and improve the overall chance of success. Access this study to uncover which 8 factors determine an employee engagement program's success. Published by: IBM



Get Control Over Your Cloud Security

Wed, 30 Nov 2016 24:00:00 EST

You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure. Published by: LogRhythm, Inc.



5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veeam Software

Mon, 31 Oct 2016 24:00:00 EDT

Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision. Published by: Commvault



How Many Network Connected Medical Devices Does Your Organization Have?

Wed, 05 Oct 2016 24:00:00 EDT

IT security experts agree that internet-connected medical things (IoMT) are the weakest spots in a hospital's security umbrella. Discover the vulnerabilities of IoMT and the new regulatory standards being developed to patch them. Published by: Zingbox



5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With EMC Software

Mon, 31 Oct 2016 24:00:00 EDT

Learn five reasons why you should rethink your data protection and information management software. Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision. Published by: Commvault



Top Reasons Why Customers Deploy Flash Storage

Sat, 30 Apr 2016 24:00:00 EDT

Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology. Published by: TechData - EMC



A Network View Of Docker Containers.

Mon, 31 Oct 2016 24:00:00 EDT

Learn tips for getting visibility into container networking to create a more secure environment overall. Many top concerns can be addressed with a better understanding of basic container security and networking. Published by: NeuVector



Banking Security in Today's Mobile World

Fri, 30 Sep 2016 24:00:00 EDT

This infographic explains why security is the key to better mobile banking. Learn how to securely expand in the mobile world now. Published by: HID



Encryption and Data Policies Help Boost Mobile Backup

Tue, 29 Nov 2016 24:00:00 EST

Mobile data backup presents the challenge of remote users accessing data around the clock, but there are steps you can take to make it easier. Published by: SearchDataBackup.com



What to Look for in Incident Response Management Tools

Tue, 29 Nov 2016 24:00:00 EST

Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital. Published by: SearchSecurity.com



Facts About the Cloud

Tue, 29 Nov 2016 24:00:00 EST

By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology. Published by: Sage Software - Live



Give Them Access. NOT a VPN

Tue, 29 Nov 2016 24:00:00 EST

Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk. Published by: Bomgar Corp.



Building the Business Case for Strong Authentication

Fri, 07 Oct 2016 24:00:00 EDT

With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience. Published by: HID



Top Reasons Why Customers Deploy Hybrid Storage

Sat, 30 Apr 2016 24:00:00 EDT

Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology. Published by: TechData - EMC



Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition

Tue, 22 Nov 2016 24:00:00 EST

Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms. Published by: Riverbed Technology, Inc.



Guide & Checklist to Container Security

Mon, 31 Oct 2016 24:00:00 EDT

This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production. Published by: NeuVector



CIO's Security Checklist: Do You Know What Your Vendors are Doing?

Mon, 28 Nov 2016 24:00:00 EST

This short infographic asks an important question: Do you have complete visibility intro what your vendors are doing in your network? Learn why legacy solutions used by companies today don't provide the granular control of access required to ensure security. Published by: Bomgar Corp.



Definitive Guide to Cloud Access Security Brokers

Mon, 28 Nov 2016 24:00:00 EST

In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them. Published by: BitGlass



BYOD and Mobile Security Report

Mon, 28 Nov 2016 24:00:00 EST

Discover how deep insights into top mobile security challenges reveals the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age. Published by: BitGlass



Securing BYOD without MDM

Mon, 28 Nov 2016 24:00:00 EST

Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents. Published by: BitGlass



The Evolution of Cloud Security: Perception vs. Reality

Mon, 28 Nov 2016 24:00:00 EST

This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more. Published by: BitGlass



How Midmarket IT Leaders Can Improve Their Data Security

Tue, 13 Sep 2016 24:00:00 EDT

This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures. Published by: Arctic Wolf Networks, Inc.



A CIO’s Guide for Reducing Security Anxiety

Mon, 31 Oct 2016 24:00:00 EDT

Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board. Published by: BitSight



How to Facilitate a Successful Transition to Office 365: A Brief Video

Fri, 16 Sep 2016 24:00:00 EDT

Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users. Published by: Riverbed Technology, Inc.



Threat management: Essential guide

Fri, 25 Nov 2016 24:00:00 EST

Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management. Published by: ComputerWeekly.com



EU data protection: Essential guide

Thu, 24 Nov 2016 24:00:00 EST

The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows. Published by: ComputerWeekly.com



The Future of Security: Advanced Security Analytics

Tue, 22 Nov 2016 24:00:00 EST

As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds. Published by: LogRhythm, Inc.



Marisol Enables Secure BYOD

Wed, 23 Nov 2016 24:00:00 EST

Learn how Marisol International enabled secure access to corporate data form any mobile device without the need for software agents. Discover how they can now access rich visibility and analytics, enabled selective wipe of corporate data, and more. Published by: BitGlass



How MDM Software Exposes Your Personal Data

Wed, 23 Nov 2016 24:00:00 EST

Several willing participants had MDM software put on their personal devices. The outcome? At the click of a button information on the participants' interests, activities, relationships, and more were compromised. Access now to uncover how MDM software can actually put your personal data at risk and what can be done to stop it. Published by: BitGlass



The Intricacies of a CASB Revealed

Wed, 10 Aug 2016 24:00:00 EDT

This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization. Published by: BitGlass



Top 3 Cybersecurity Challenges Facing Healthcare Organizations

Thu, 30 Jun 2016 24:00:00 EDT

Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation. Published by: Arctic Wolf Networks, Inc.



Top 6 Cloud Data Protection Challenges. Solved.

Wed, 23 Nov 2016 24:00:00 EST

Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more. Published by: Commvault



The Top Cybersecurity Risks – And How Enterprises Are Responding

Mon, 31 Oct 2016 24:00:00 EDT

Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers. Published by: Arctic Wolf Networks, Inc.



Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers

Wed, 23 Nov 2016 24:00:00 EST

Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability. Published by: Bomgar Corp.



Why DevOps + Security = A Bright Idea

Fri, 18 Nov 2016 24:00:00 EST

By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures. Published by: SearchSecurity.com



Top 5 SIEM Challenges for the Midmarket

Tue, 22 Nov 2016 24:00:00 EST

Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can. Published by: Arctic Wolf Networks, Inc.



LogRhythm's Security Analytics Platform: Product Overview

Tue, 22 Nov 2016 24:00:00 EST

In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats. Published by: LogRhythm, Inc.



The Future Of Data Security And Privacy: Growth And Competitive Differentiation

Thu, 07 Jul 2016 24:00:00 EDT

Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently. Published by: Absolute



Webcast: Solving the DLP Puzzle: Learnings for a Successful Deployment

Thu, 08 Sep 2016 24:00:00 EDT

Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is.We've collected tips and techniques to ease common pain points, including successful customer migration use cases to Intel Security DLP. Published by: Intel Security