ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • 2016 Cyber Security Intelligence Index

    Sponsored by: IBM

    This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • ESG Video Interview: Virtualization-Driven Data Protection Modernization

    Sponsored by: IBM

    ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.

  • Help Minimize Impact to Patient Care in the Event of a Disaster

    Sponsored by: McKesson Corporation

    Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.

  • Simplified Data Protection for the Modern Enterprise: An Expert Evaluation

    Sponsored by: IBM

    Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.

  • Tolly evaluation: IBM Security Access Manager

    Sponsored by: IBM

    In this white paper, Tolly evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • 7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management

    Sponsored by: Information Builders

    This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.

  • Engineering Company's Multi Cloud Success Story

    Sponsored by: TrendMicro

    Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • Computer Weekly – 30 August 2016:Get protected

    Sponsored by: ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlight the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Manufacturing Company's AWS Success Story

    Sponsored by: TrendMicro

    If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.

  • Modernizing Data Protection

    Sponsored by: IBM

    Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.

  • Clearing the Confusion of Modern Data Protection

    Sponsored by: IBM

    One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.

  • Protecting Data is a Snap with Cloud-Based Replication

    Sponsored by: Dell, Inc.

    In this tech brief, explore how to replicate on-premises backups from a rapid recovery core to the cloud for simplified data protection and disaster recovery. See how your enterprise can benefit from easy scalability, redundancy, and cost savings, by replicating to the cloud.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).

  • The Right Backup and Recovery Solution Can be a Business Enabler

    Sponsored by: Veritas

    Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.

  • Protecting Large Scale Environments with Veritas NetBackup

    Sponsored by: Veritas

    In this resource, discover a comprehensive, converged backup platform that supports both physical and virtual infrastructures. This solution can support your present and future data protection needs with benefits such as lower ongoing operating costs, greater scalability, simplified maintenance, and more.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • Choosing the Right Public Cloud for Better Data Protection

    Sponsored by: Dell, Inc.

    Integrating infrastructure-as-a-service (IaaS) and data protection software can help your enterprise solve the complexity and cost challenges of protecting data. Discover what public cloud capabilities and data protection software capabilities your enterprise should focus on when choosing a solution for your needs.

  • Protecting Critical Data in Virtual Environments

    Sponsored by: IBM

    VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.

  • Account Takeover How Hacking Happens in 2016

    Sponsored by: IMMUNIO, Inc.

    This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.