Information Security Research Library

Powered by Bitpipe.com

White Papers

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • Safety Through Synergy

    Sponsored by: NEC Corporation of America

    Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.

  • Staying Secure and Compliant during Windows XP End-of-Life

    Sponsored by: Bit9 + Carbon Black

    In this white paper, discover the a new security solution that can enable you to continue using Windows XP to the fullest while keeping your systems compliant and secure.

  • How Do Top SIEM Products Compare in Common Client Deployment Scenarios?

    Sponsored by: IBM

    This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.

  • Symantec Managed Security: Integrating the Network and Endpoints

    Sponsored by: Symantec Corporation

    In this informative white paper, discover a new threat protection platform that integrates security across the network and endpoint, while also providing critical context to detected attacks.

  • Reputational Risk and IT in the Digital Age

    Sponsored by: IBM

    This white paper examines how security and business continuity can shape the reputation and value of your company in the digital age.

  • Security Report 2014: Trends and Developments in the Security Industry

    Sponsored by: IBM

    In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.

  • Inform e-Book Summer 2014

    Sponsored by: Hewlett-Packard Company

    This extensive resource examines the latest and greatest in the world of IT security, including in-depth reports on advanced malware, security case studies, industry insider interviews, and more.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • Advanced Endpoint and Server Protection

    Sponsored by: Bit9 + Carbon Black

    In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.