BITPIPE RESEARCH GUIDE:
Security White Papers


Security is all about protecting corporate information and technology assets from intruders, thieves, and vandals. Coping with spyware, viruses, and firewall vulnerabilities are some of the most significant challenges facing enterprise IT departments. Learn about security and related topics, including antivirus software, authentication, spyware removal, intrusion detection, and virus protection.

Use this Bitpipe Research Guide on Security to locate the latest white papers, webcasts, case studies and product information for Authentication, Data Security, Firewall Management, Internet Security, Intrusion Detection Systems, Network Security and Security Policies.

Read our Security Overview to learn how to develop your security policies and procedures. Then get started on choosing the right security solution for your company's needs with our Security First Steps.

Browse Security Reports
Security News and Information

Security news, technical tips and industry experts available at SearchSecurity.com.

Learn about Security-related topics including: Authentication, Email Security, Firewalls, Intrusion Prevention and SSL (Secure Socket Layer).

 
Bitpipe Research Guides
 
Industry Guides
 

Recent Security Reports
(topics include worms, trojan attacks, computer security, antispyware, security systems, certificates, wireless security, intrusion protection)

 

e-Guide: Conquering Advanced Persistent Threat Attacks

sponsored by CDW Corporation
This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises. (EGUIDE: August 29, 2014) more..

App Security: Decompiling Android APK Files

sponsored by CDW Corporation
In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses. (EGUIDE: August 29, 2014) more..

HP StoreOnce Backup - Deduplicate anywhere, replicate everywhere

sponsored by Hewlett-Packard Limited
From ROBO to the enterprise, HP StoreOnce Backup with StoreOnce Catalyst is a single, agile, efficient and secure backup and recovery solution. Reduce costs and keep pace with data growth, confident that your SLAs are securely met and your valuable data is not at risk. (PRESENTATION: August 29, 2014) more..

Six Ways You May Be Losing Mobile Data and Not Even Know It

sponsored by Symantec Corporation
This crucial white paper outlines the 6 ways that your mobile data could be compromised, and why you might not even realize that it's happening until it's too late. (WHITE PAPER: December 31, 2013) more..

HP named a leader in first Magic Quadrant for Deduplication Backup Target Appliances

sponsored by Hewlett-Packard Limited
Gartner has published its first ever evaluation to help storage professionals short list potential vendors. This white paper examine the solution that's most capable of reducing costs, lowering risk, and eliminating complexities despite growing demands. (PRODUCT OVERVIEW: August 29, 2014) more..

Most Popular Security Reports

 

Authentication

E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA

 sponsored by IBM

Your September Issue of Information Security Magazine– Readers’ Choice Awards

 sponsored by Information Security Magazine

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

 sponsored by RSA, The Security Division of EMC
  More Reports on Authentication >>
 

Network Security

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud

 sponsored by IBM

The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs

 sponsored by Intel

E-Book: Technical Guide on Network Security Monitoring

 sponsored by AVG Technologies USA, Inc.
  More Reports on Network Security >>
 

Security Management

IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7

 sponsored by Intel

E-Book: Technical Guide on Application Security: Secure Development

 sponsored by IBM

E-Book: Technical Guide on Application Security: Scanning Production Applications

 sponsored by IBM
  More Reports on Security Management >>
 

Wireless Security

Engineering the Wireless Hospital

 sponsored by Aerohive Networks

5 Steps to Secure the Wireless Network

 sponsored by NETGEAR Inc.

Secure Smartphone Apps: The Next Generation

 sponsored by BlackBerry
  More Reports on Wireless Security >>
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement