Research Library

Powered by

Data Security Research

  • State of Application Delivery in APAC 2015

    Sponsored by: F5 Networks

    The following infographic is chock full of information regarding the state of application delivery in APAC. Discover the results of 3,266 surveyed IT decision-makers across Asia about their current and planned use of application services.

  • The Essential Guide to Building a Strong MDM Foundation

    Sponsored by: IBM

    In this essential guide, you will learn the about 12 best practices for implementing mobile device management in your business. Read on here to start introducing these MDM strategies, taking your organization to the next level.

  • Technical Brief: Data Cloud Backup

    Sponsored by: Dimension Data

    This technical brief discusses a data cloud backup system that can allow your enterprise to backup your workload, whether the server is in the cloud, on premise, or in a managed hosting environment. Read on to see the many benefits this cloud backup solution can provide your enterprise.

  • Navigate The Future Of Identity And Access Management

    Sponsored by: Covisint

    In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.

  • Cloud Backup is not "One Size Fits All" - Five Factors for Consideration

    Sponsored by: Dimension Data

    This beneficial document discusses five areas that IT directors should closely examine to determine which cloud backup approach will best fit their specific requirements. Read on to see the specific questions you should poise to cloud service providers to help you leverage the technology to fit your data needs.

  • Protecting Your Data in the Cloud: A Multilayered Approach to SaaS Security

    Sponsored by: Workforce Software

    In this white paper, learn about a multi-layered software-as-a-service security option that keeps sensitive cloud HR information safe. Explore the various layers of security this option offers, including physical safeguards, technical safeguards, and more.

  • Information Governance: People, Process & Technology

    Sponsored by: DLT Solutions

    This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.

  • State of File Collaboration Security

    Sponsored by: FinalCode

    Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.

  • The Essential Executive Starter Guide to Microsoft Azure

    Sponsored by: Softchoice Corporation

    Access this essential guide to examine five steps necessary to ensure a successful move to Microsoft Azure. Inside you'll discover best practices, tips, and industry examples of how to deploy Microsoft Azure and learn key obstacles organizations face in delivering Azure and how to overcome them.

  • PST Migration Requirements

    Sponsored by: QUADROtech

    This video outlines PST migration requirements. Tune in to learn about the importance of transparency, speed, and more so that you can have the smoothest migration process possible.

  • Eliminating PSTs with PST FlightDeck

    Sponsored by: QUADROtech

    This brief video details an email archive platform that simplifies PST migration. Tune in to learn how you can reduce costs and downtime during migration.

  • Old PCs Put Your Business at Risk

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.

  • The Essential Guide to Microsoft Azure Security

    Sponsored by: Softchoice Corporation

    Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.

  • ArchiveShuttle Product Video

    Sponsored by: QUADROtech

    This video outlines how to easily migrate email and protect sensitive data through archiving. Tune in to learn about how to reduce the cost, complexity, and risk of email archiving at every stage of the process.

  • Case Study - Global Financial Services Provider 60 TB PST Migration

    Sponsored by: QUADROtech

    This case study chronicles how one company made the decision to eliminate PST files through migration, and how compliance played a part in this decision. Read on to learn how this company was able to quickly and easily archive 67,000 files.

  • Bridging the Information Governance Gap

    Sponsored by: Recall Corporation

    Access this resource to learn how user-friendly, collaborative, and powerful processes that create an automated, enterprise-wide information governance environment may mean that your organization will soon be able to control your data, instead of data controlling you.

  • Web application firewall provides continuous web app protection

    Sponsored by: Trustwave

    Access this white paper to learn about a web application firewall appliance that provides real-time, continuous security against attacks and data loss and assures that your web applications operate as intended and are compliant with industry regulations and discover how you can protect against the loss of sensitive information.

  • 2015 Electronic Communications Compliance Survey Report

    Sponsored by: Smarsh

    This 5th annual Electronic Communications Compliance Survey Report explores the current landscape of compliance and the emerging risks/threats.

  • Breaking Down the Main Barriers to Cloud Backup

    Sponsored by: Dimension Data

    Access this white paper to learn about the barriers that IT leaders have to overcome when considering the management of data backup within cloud storage. Read on to see what your enterprise should take into account if you are considering cloud for your data management.

  • The State Of Endpoint Security Adoption 2014 To 2015

    Sponsored by: Dell, Inc. and Intel®

    In this special report, Forrester presents the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.

  • 3 Essential Components for a Strong End User Security Strategy

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.

  • WAF Enables Cloud and Hosting Providers to Bolster Security Offerings

    Sponsored by: Radware

    In this white paper, explore how cloud and hosting providers can improve security to attract more customers, improve per-customer revenue, and increase loyalty. Continue reading to learn the top 3 web app security challenges and how to put customers' minds at ease.

  • The Role of Third-Party Tools for Office 365 Compliance

    Sponsored by: Smarsh

    This white paper explores the challenges of keeping Office 365 in regulatory compliance for your enterprise. Access now to see how you can keep your enterprise up on all of your auditing and reporting requirements.

  • Case Study: Securing Files Anywhere in the World

    Sponsored by: FinalCode

    By using a case study of one successful corporation, this white paper examines what you can do to maintain the confidentiality of all your files, no matter who has access to them.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without changing the way employees share them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.