Research Library

Powered by

Data Security Research

  • Data Defense Doesn't Win Championships

    Sponsored by: Delphix

    Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.

  • Compare enterprise file-sync-and-sharing software and deployment options

    Sponsored by: Insight

    Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more.

  • Compare the top enterprise file-sync-and-sharing vendors

    Sponsored by: Insight

    Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.

  • Data Management Platforms for GDPR: Buyer's Checklist

    Sponsored by: Delphix

    Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.

  • GDPR Requirements for Data Masking

    Sponsored by: Delphix

    This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.

  • Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

  • You Need an Action Plan for the GDPR

    Sponsored by: SailPoint Technologies

    It's time to create an action plan to tackle GDPR. This 10-page Forrester Report offers GDPR assistance to security and privacy professionals in preparing data protection strategies to comply with 5 core requirements of the regulation.

  • Banking on Cybersecurity

    Sponsored by: HyTrust

    According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.

  • DataOps for Data Privacy and Security

    Sponsored by: Delphix

    Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.

  • Stopping the Insider Threat

    Sponsored by: SailPoint Technologies

    Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

  • Executing a Lockdown on Cybersecurity Threats

    Sponsored by: Navex Global

    Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.

  • Report: IAM Leadership Compass

    Sponsored by: Janrain

    This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

  • Effective Isolation and Workload Security in the Multi-Tenant Cloud

    Sponsored by: HyTrust

    A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.

  • Security Solutions for Public Sector Virtual Infrastructure

    Sponsored by: HyTrust

    Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.

  • Customer IAM Analysis

    Sponsored by: Janrain

    In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

  • Key Considerations in Selecting a Customer IAM Solution

    Sponsored by: Janrain

    The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

  • GDPR Primer and Readiness Assessment

    Sponsored by: Janrain

    This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.

  • GDPR & Data Protection Webcast

    Sponsored by: Oracle

    Take an in-depth look at this data protection and GDPR webcast to learn more about the regulation and uncover relevant compliance strategies. In addition, hear from a business consultant from the Dutch Ministry of Economic Affairs regarding their experience implementing a data protection strategy.

  • Report: Customer Identity and Access Management

    Sponsored by: Janrain

    In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.

  • GDPR Security Strategies

    Sponsored by: Oracle

    The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.

  • SmartProtect Program: Solution Brief

    Sponsored by: Corero Network Security

    To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.

  • Top Trends That Will Shape CIAM in 2018 and Beyond

    Sponsored by: Janrain

    In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

  • Revolutionizing the Sharing Economy

    Sponsored by: Evident

    According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Cloud-based backup services are a safety net in tricky times

    Sponsored by:

    Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.