ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • 6 Best Practices for Securing AWS Environments

    Sponsored by: Centrify Corporation

    Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.

  • The Impact of Data Breaches on Reputation and Share Value

    Sponsored by: Centrify Corporation

    Discover how IT practitioners, marketers, and consumers view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.

  • Become a Champion of PCI Compliance by Minimizing Your Attack Surface

    Sponsored by: Centrify Corporation

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

  • 6 Best Practices: Privileged Access Security for AWS

    Sponsored by: Centrify Corporation

    This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.

  • Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication

    Sponsored by: Centrify Corporation

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

  • Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model

    Sponsored by: Centrify Corporation

    Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.

  • What’s New in MySQL 5.7

    Sponsored by: Oracle Corporation

    Oracle's MySQL 5.7 offers a secure, scalable way to manage data. Learn more about the performance and security improvements in this iteration of MySQL in the following white paper.

  • Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value

    Sponsored by: Rubrik

    Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.

  • Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk

    Sponsored by: Lookout

    Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.

  • Fast Track Containers to Production

    Sponsored by: Diamanti

    Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.

  • What GDPR Means for Your Security Strategy

    Sponsored by: Dell SecureWorks

    Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.

  • Big Pharma, Healthcare, Biotech & Life Sciences: How Are These Industries Handling Big Data?

    Sponsored by: Unisys

    According to new research, 215 executives and IT professionals in the pharmaceutical industry reveal that big data has become a key priority. But organizations must take time to fulfill the potential of large data sets and ensure cyber security. Uncover how big pharma is using big data, and how they're overcoming associated challenges.

  • Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

    Sponsored by: Gigamon

    Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.

  • Sungard AS Data Protection Customer Case Study

    Sponsored by: Dell EMC and Intel®

    Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.

  • TIBCO Spotfire Server Overview

    Sponsored by: TIBCO Software Inc.

    With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale.

  • Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage

    Sponsored by: Dell EMC and Intel®

    Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage.

  • Top Reasons to Choose Dell EMC Data Protection Over HPE

    Sponsored by: Dell EMC and Intel®

    Find out how to achieve truly scalable, cost-effective data protection and backup. Plus, discover 8 reasons to consider Dell EMC data protection when building your strategy for securing data in cloud and virtual environments.

  • 10 Tips for Selecting a Digital Signature System

    Sponsored by: Microsoft

    This white paper explores how to incorporate an e-signature system into your digital document management strategies. Uncover 10 questions to ask when selecting a digital signature tool.

  • Analyzing the Malware Threat

    Sponsored by: Symantec & Blue Coat Systems

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • Information Protection in the Web and Cloud Era

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.

  • Compliance: The 'Privacy By Design' Approach To Secure Personal Data

    Sponsored by: Symantec & Blue Coat Systems

    Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.

  • A Computer Weekly Buyer's Guide to EU General Data Protection

    Sponsored by: ComputerWeekly.com

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

  • Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

  • Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns

    Sponsored by: HGST

    This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.