Information Security Research Library

Powered by

All Research

  • Keep Up With the Evolving Threat Landscape to Protect Email

    Sponsored by: Cisco Systems, Inc.

    Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.

  • Get the Most Value Out of Network Security

    Sponsored by: HP and Intel

    This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

  • Promise Healthcare case study

    Sponsored by: Dell Software

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

  • Securing the Small Business Network

    Sponsored by: Dell Software

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • What to look for when evaluating NGFW

    Sponsored by: Dell Software

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

  • Why threat intelligence is critical for next generation firewalls

    Sponsored by: Dell Software

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

  • Overcoming exploits that use advanced evasion techniques and SSL encryption

    Sponsored by: Dell Software

    To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

  • How SMBs can stop Malvertising

    Sponsored by: Dell Software

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

  • Managed File Transfer: Business Users Need Visibility

    Sponsored by: IBM

    End-users are striving to enable collaboration and integrate as many business processes as possible, and in our information-driven society, managed file transfer (MFT) is tied closely with achievement of critcal business objectives.

  • MFT Center of Excellence Whitepaper

    Sponsored by: IBM

    Many companies have implemented managed file transfer (MFT) as a way to gain control over a wide array of file transfer activities.  By employing these products, companies have remediated the inherent risk of File Transfer Protocol (FTP).

About the Information Security Research Library

The Security Research Library is your source for research and in-depth literature covering enterprise security and relevant security technologies. Find the latest vendor and analyst white papers, case studies, webcasts, and product information to help you expand your knowledge of topics including security software, wireless security, authentication, identity management, virus detection software, and security policies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.