Information Security Research Library

Powered by

Network SecurityResearch

  • Leveraging Network Infrastructure for Competitive Success in Midsize Businesses

    Sponsored by: Cisco Systems, Inc.

    Access this white paper now to learn how mid-market firms can leverage network infrastructure for success in the era of mobility and the cloud.

  • Mobile Management and Security Essentials

    Sponsored by: Fiberlink

    Smartphones and applications were at first targeted to the consumer - games, videos, and other entertainment flooded the app market.  However, these devices were quickly adopted by businesses to help further advance processes.

  • Enable Secure Access to Apps

    Sponsored by: Fiberlink

    The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • Mobile Device Management Checklist

    Sponsored by: MobileIron

    A well thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.  This expert E-Guide highlights a mobile device management checklist.

  • Key Benefits of Secure Mobile Intranet Access

    Sponsored by: Fiberlink

    Workforce mobility has caused us to change the way we do business.  Today, mobile workers expect to be able to reach corporate resources from anywhere, as if they were in the office.  This data sheet features a solution that mobilizes SharePoint and many other Intranets.

  • Meet Client Needs While Ensuring Corporate Data and Device Security

    Sponsored by: Fiberlink

    After making the switch from mobile phones to smartphones, companies need an easy-to-use enterprise mobility solution that can ensure device, data, and email security.

  • Proven Practices for Securing Your Website Against DDoS Attacks

    Sponsored by: Dyn

    This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.

  • Mobile Security: Threats and Countermeasures

    Sponsored by: MobileIron

    Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.

  • Get the Most Value Out of Network Security

    Sponsored by: HP and Intel

    This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

  • Promise Healthcare case study

    Sponsored by: Dell Software

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

  • Securing the Small Business Network

    Sponsored by: Dell Software

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • What to look for when evaluating NGFW

    Sponsored by: Dell Software

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

  • Why threat intelligence is critical for next generation firewalls

    Sponsored by: Dell Software

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

  • Overcoming exploits that use advanced evasion techniques and SSL encryption

    Sponsored by: Dell Software

    To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

  • How SMBs can stop Malvertising

    Sponsored by: Dell Software

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

  • Beyond next gen firewalls

    Sponsored by: Dell Software

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

  • A Guide to Disaster Recovery in the Cloud

    Sponsored by: Avnet Technology Solutions

    Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.

  • A Risk Advisor Tool to Keep Hackers at Bay

    Sponsored by: IBM

    Access this resource to discover a FTP risk advisor tool that will assist you in navigating the threat landscape.

  • 2013 Threat Report

    Sponsored by: Dell Software

    This report extensively details and categorizes recent global trends in network threats.

  • Control Network Security with a New Approach to Malware Defense

    Sponsored by: Hewlett-Packard Company

    This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.

  • EMM Challenges: Three Ways to Balance IT Needs With User Demands

    Sponsored by: BlackBerry

    End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.

  • A Guide to Improving Your Network Security in 30 Days

    Sponsored by: Hewlett-Packard Company

    This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.

  • Securing Your IT Infrastructure with SOC/NOC Collaboration

    Sponsored by: Hewlett-Packard Company

    Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.

  • A Universal Log Management Solution

    Sponsored by: Hewlett-Packard Company

    In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.