ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.

  • Keeping the Keys to Your Cloud Future Secure

    Sponsored by: Entrust, Inc.

    Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.

  • The 5 Rings of Data Integration Hell

    Sponsored by: Globalscape

    In this guide, discover the 5 "rings of hell" that make meeting data integration requirements difficult. In addition learn about the various scenarios which can cause data integration challenges, various methods for data migration worth considering, and more.

  • How The US Navy Helped Transform Today's BDR Market

    Sponsored by: QuorumLabs Inc.

    This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Security for the Future-Ready Workforce

    Sponsored by: Dell, Inc. & Intel®

    To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.

  • Survey Findings: Data Security

    Sponsored by: Dell, Inc. & Intel®

    This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.

  • Reviewing the Current State of Hyperconvergence and Benefits of Virtual SAN Deployments

    Sponsored by: VMware

    Discover the top 2016 trends driving organizations to deploy hyperconverged infrastructure. Read on to also see illustrated the benefits achieved from HCI built on virtual SAN for 3rd Platform technologies.

  • How to Create a Holistic Strategy for Office 365 Data Protection

    Sponsored by: AvePoint, Inc.

    Learn how to make security part of your regular workflow with tools that help integrate compliance into everyday business use of Office 365. Discover how to minimize the risk of a breach and ensure uninterrupted user workflow by baking in compliance tools from the beginning.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your mobile workforce, which include network security, access management, app security, and monitoring and response.

  • Manage Risk by Protecting the Apps and Data that Drive Business Productivity

    Sponsored by: Citrix

    Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.

  • Two-Factor Authentication Helps Officers Protect and Serve New York

    Sponsored by: BlackBerry

    Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.

  • Autodata Speeds the Delivery of Information with API Management

    Sponsored by: TIBCO Software Inc.

    This case study explores how Autodata implemented an integrated API management platform to simplify key development processes and create new opportunities for IoT. Discover how they leveraged APIs to improve customer service, enhance data security, and more.

  • 9 Reasons to Ditch Your Spreadsheets

    Sponsored by: Sage Software

    Are you still using spreadsheets to manage your fixed assets? Here are nine reasons why you need to consider replacing your manual spreadsheet management system with something new.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Data Breaches: Is Prevention Practical?

    Sponsored by: Palo Alto Networks

    Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.

  • Best Practices for Healthcare Data Breach Prevention

    Sponsored by: Absolute

    As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Six Steps to Effective Healthcare Data Breach Response

    Sponsored by: Absolute

    Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.

  • The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute

    Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.

  • The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints

    Sponsored by: Absolute

    As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.

  • IDC Technology Spotlight: Modern "Embedded" Endpoint Security

    Sponsored by: Absolute

    This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.

  • Secure Email Against Targeted Phishing Attacks

    Sponsored by: Blue Coat Systems

    To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • How to Determine if Cloud ERP Software is Right for You

    Sponsored by: Sage Software

    Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.