ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Data Warehousing in the Cloud: An Essential Adoption Checklist

    Sponsored by: IBM

    Discover how to glean greater business value from your data by utilizing a cloud-based data warehouse. Read on to uncover a 7-point checklist that will facilitate easy adoption for this cloud model, including instruction on how to meet consistent performance requirements and proactively manage data connectivity.

  • Retail Tip Sheet

    Sponsored by: Trustwave

    It's easy to assume your organization won't fall victim if you've check off all compliance requirements. But hackers are always evolving their methods to get what you don't want them to have. Discover 10 practices you can enact to avoid costly data breaches.

  • E-discovery Software Brings Serious ROI to Information Governance

    Sponsored by: Globanet Veritas

    Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.

  • Data Governance: Expert Q&A and Picking The Right DG Tool

    Sponsored by: Globanet Veritas

    This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.

  • Buyer's Guide to Enterprise Collaboration Solutions

    Sponsored by: IntraLinks, Inc

    Content collaboration platforms provide security and ease of use so mission-critical processes aren't interrupted. Learn what to look for in these platforms and how to decide which one is right for your organization.

  • IT Project: Storage Architecture ANZ

    Sponsored by: ComputerWeekly.com

    When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.

  • Veritas Enterprise Vault Health Check Tool: Monitor, Analyze and Report on Areas of Critical Importance

    Sponsored by: Globanet Veritas

    This data sheet highlights an enterprise vault health check tool that provides automated Veritas Enterprise Vault archive analysis and reporting to help with the performance and integrity of your key data archives.

  • Compliant Digital Identity Protection for Healthcare

    Sponsored by: VASCO Data Security International

    Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.

  • Data Archiving Solutions - Archive Data with Industry Leading Systems

    Sponsored by: Globanet Veritas

    All types of companies rely on their data and need archiving solutions to protect it. This resource center highlights a service provider that deploys industry-leading archive systems and solutions for organizations worldwide. Learn about this provider's professional on-site and remote support that can meet your organization's every need.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: SearchSecurity.com

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • 5 Steps to Keeping Your Data Safe with a Content Mobility Solution

    Sponsored by: Hitachi Data Systems

    Explore a five step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.

  • The Rising Face of Cyber Crime Ransomware

    Sponsored by: BitSight

    Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.

  • IT Project: Storage Architecture ASEAN

    Sponsored by: ComputerWeekly.com

    When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Comparative Overview of File Sync and Share Platforms

    Sponsored by: Hitachi Data Systems

    Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.

  • Disaster Recovery’s Treacherous Terrain

    Sponsored by: IBM

    Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.

  • File Sync and Share: There’s Too Much at Stake to Compromise

    Sponsored by: Hitachi Data Systems

    Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.

  • Get the Most out of your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Masters of Disaster Recovery: How Highly Resilient Organizations Excel

    Sponsored by: IBM

    Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.

  • Securing & enabling the Mac-empowered enterprise

    Sponsored by: Code42

    This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.

  • Reeling in Ransomware Data Protection for You and Your Users

    Sponsored by: Code42

    In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection

    Sponsored by: Code42

    With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.