ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Rethinking Data Discovery And Data Classification

    Sponsored by: IBM

    Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Accelerated i/O for Cloud Storage

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Infographic – IRM Underground Data Center

    Sponsored by: Iron Mountain

    Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.

  • Key Features and Functions of EMC Isilon in Big Data Workflows

    Sponsored by: EMC

    This white paper evaluates a scale-out data lake platform that provides robust multi-protocol ingest capabilities to make it easier to build a Big Data workflow in a data lake. Learn more about the key features of this solution and see how it can enable your enterprise to simplify your data management operations and keep your data secure.

  • Secure, Scalable Collaboration with Predictable GPU Acceleration and Low TCO

    Sponsored by: AMD

    Discover how manufacturers can stay competitive in today's economy with VDI powered by hardware-based GPU virtualization technology and see benefits including empowering mobility and collaboration, safeguarding sensitive data, efficient IT management, and more.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Easy Collaboration and Version Control with Full GPU Performance and Data Security

    Sponsored by: AMD

    Learn how VDI powered by hardware-based virtualized GPU technology empowers GPU-accelerated mobility and collaboration while simplifying version control, safeguarding sensitive data, and more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 10 REASONS TO TEST, NOT GUESS

    Sponsored by: Trustwave

    This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.

  • Online Phishing

    Sponsored by: Navex Global

    Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.

  • Reference Guide: Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Simple, Secure, Affordable Hosted Archiving

    Sponsored by: eTECH Channel

    Explore a reliable and secure enterprise archiving solution that eliminates the need for additional storage management by securing data in off-site locations. Discover how this solution can enable your enterprise to boost the efficiency of your diagnostics, search and recovery, and data security capabilities.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • Tale of the Tape: Moving Backup and Recovery to the Cloud

    Sponsored by: Iron Mountain

    Discover a cloud-based data replication solution that effectively protects and recovers data and boosts the efficiency of storage with high-speed reliable connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.

  • Don't Let Your Data Outgrow You: Stay Ahead with Smart, Scalable Archiving

    Sponsored by: EMC

    Explore an efficient, scalable disk-based archive solution that can enable your enterprise to simplify data management and protection, scale capacity quickly without disruption, optimize with automated storage tiering, and more.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Archive All of Your Business Critical Data in One Archive

    Sponsored by: eTECH Channel

    Explore a data archive solution that de-duplicates, indexes, compresses, and archives data. Discover how this platform can provide your enterprise with the speed and storage necessary to handle increased volumes and variety of email, social media, and other data sources.

  • Salesforce Shield for Healthcare

    Sponsored by: Salesforce.com

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

  • How to Protect Your Data in a Converged Infrastructure Environment

    Sponsored by: Hewlett Packard Enterprise

    Download this infographic to improve capacity utilization for the new influx of mobile, cloud, and big data with a converged storage environment. Learn why you should consider a converged storage environment to optimize your data protection and enable seamless data movement between devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.