ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Making sure you can provide secure I.T. oversight is the first step in considering a file sync and share solution for your organization. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for next-generation workspaces.

  • Case Study: Hunters Safeguards 150TB of Architectural Data with Arcserve UDP

    Sponsored by: arcserve

    In this case study, witness how Hunters, a consultancy firm, implemented a Unified Data Protection (UDP) solution that automatically generated backup reports and minimized their storage requirements and costs with integrated deduplication capabilities.

  • Rethinking the cyber security disconnect

    Sponsored by: VMware

    Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.

  • Top 10 Reasons to choose EMC Data Protection Solutions

    Sponsored by: Richardson Eyres

    Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.

  • The Axway MFT Solution Transcript

    Sponsored by: Axway

    It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.

  • Axway Use Cases- Transcript

    Sponsored by: Axway

    Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.

  • MFT as a Shared Service- Transcript

    Sponsored by: Axway

    Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.

  • Best Practices for Safeguarding Patient Records and Sensitive Information

    Sponsored by: Symantec Corporation

    In this exclusive white paper uncover the 101 on safeguarding patient records and sensitive information. Read on to learn about topics like, managing data on-premises and in the cloud, data loss prevention, and much more.

  • Unlocking the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • eCommerce Payments 101 (Part 2)

    Sponsored by: CyberSource

    Tune into this brief video to discover how to automate payment operations while simplifying fraud management and payment security. Watch this tutorial to streamline the efficiency of payroll in your financial organization, and get the lowdown on securing online payments.

  • Data Refinement: Facilitating the data-driven organization

    Sponsored by: IBM

    This comprehensive Forrester report found that well-planned and executed data refinement is the new benchmark of success. Read on to learn more about data refinement including key aspects, where you should place your investments, and how to make it work for your business.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Netsync

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Alphaserve

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Arraya

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Wrightcore

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Robust Payment Security Builds Customer Confidence in your Brand

    Sponsored by: CyberSource

    Frictionless payment transactions are key to your competitive advantage. Discover ways to avoid the costly risks of storing sensitive payment data by using various credential-based payment models.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

  • A Comprehensive, Innovative Approach to Mobile Security

    Sponsored by: Unisys

    Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.

  • Object Storage Erasure Coding and Self Protecting Technologies

    Sponsored by: HGST

    Scale-out object storage solution can provide disk-based access performance with high levels of durability, scalability, and simplicity. Discover how this storage system can enable your enterprise to simplify your storage architecture and take advantage of your data without requiring your budgets to significantly increase.

  • Object Storage Architecture Removes File Crawl Issues

    Sponsored by: Cloudian

    In this expert guide, find out the many differences of object storage that make it that much more efficient and economical fit for your enterprise, such as active or cold archiving, search, analytics, and more.

  • CERN deploys IBM data protection software to safeguard petabytes of critical data

    Sponsored by: IBM

    The IT department at CERN, known for the Large Hadron Collider, manages a massive data archive of 100 petabytes of data. Read on to learn about the data storage and backup functionality that meets CERN's big-data protection requirements.

  • TOP 8 TRENDS FOR 2016 Big Data

    Sponsored by: Tableau Software

    Big data is experiencing a boom in importance and usage. More businesses are coming to rely on data for critical decisions. Why not make your data work for you? You already own it, so make the most of it. Read on to discover the top eight trends currently underway in big data and how to make them work for you.

  • Success Story Video: State of California

    Sponsored by: Axway

    They were able to build their website quickly using a managed file transfer (MFT) system. Learn how they now centrally manage and monitor secure file transfers across all their sites and applications for all their agencies.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Cloudmark's VP of Product Management, Kevin San Diego and Gartner Research Director Perry Carpenter will tell you how to prevent future spear phishing attacks and what capabilities a spear phishing solution needs to include in order to be effective.

  • Get started in eCommerce with the Right Payment Foundation

    Sponsored by: CyberSource

    Avoid shopping cart abandonment. Discover ways to keep items in online shoppers' carts from browsing to checkout by accepting more payments across channels, while managing fraud and payment security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.