ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Unlocking Business Success The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.

  • Data Theft Prevention The Key to Security, Growth & Innovation

    Sponsored by: Forcepoint

    This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • How to Protect Patient Data in the Cloud - Best Practices Recommedations

    Sponsored by: Digital Guardian

    This white paper shows you best practices for applying DLP to the cloud.

  • Top Cloud Storage Considerations for CIOs

    Sponsored by: Commvault

    Discover in this infographic how to increase IT agility and innovation, and create seamless access to your critical data and applications, by way of cloud infrastructure implementation. Access now to learn why cloud is quickly becoming the top storage choice for companies worldwide, and take advantage of cloud-run DR.

  • Rapid Recovery, Live Recovery: Recover From a System Failure in Minutes

    Sponsored by: Dell Software

    This white paper highlights "live recovery," a recovery solution that instantly runs or resumes physical or virtual machines on any virtual platform, directly from the backup file. Read on to witness a demo of this recovery solution that shows how you can recover a sever failure in a few simple steps,

  • Stop Thinking About Your Backups: It's Time to Focus On Recovery

    Sponsored by: Dell Software

    This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.

  • The Ultimate Guide for Virtual Server Protection

    Sponsored by: Commvault

    Are you staying ahead of the tidal wave of consolidation? Read on to discover 4 questions you should be asking about your virtual server data protection. Also, learn how to optimize your storage, cloud or otherwise, to accommodate your rapidly scaled-out virtual infrastructure.

  • Case Study: Christie Digital Protects Big Data

    Sponsored by: Commvault

    In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.

  • University of Texas at Austin Ensures Network Security for its Distributed Campus

    Sponsored by: Splunk

    Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.

  • SG-ISFW-Fortinet

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.

  • Who's Spying on You?

    Sponsored by: Kaspersky Lab

    Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • Choosing the Right Public Cloud for Better Data Protection

    Sponsored by: Dell Software

    This white paper highlights ways to use infrastructure-as-a-service (IaaS) and data protection software to solve the complexity and cost challenges of protecting data. Read on to discover how to evaluate public cloud capabilities and data protection software capabilities, so that you can choose the right solution for your enterprise.

  • Best Practices for Protecting Flash-Based Arrays

    Sponsored by: Dell Software

    This white paper covers best practice for protecting flash-based storage arrays and ensuring business processes and operations are agile and responsive. Read on to see how you can successfully transform your backup and recovery software to be more compatible with flash storage.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Advanced Threat Protection Buyer's Guide

    Sponsored by: Fortinet, Inc.

    This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.

  • Building an Enterprise Security Architecture

    Sponsored by: Forcepoint

    This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.

  • Keeping Email Vulnerability at Bay

    Sponsored by: ArcMail Technology

    Access this CIO Review article to learn how email archiving is becoming a common way to fight data theft in enterprises today. Explore email archiving market trends and needs, how to ensure cost effective, continuous security, and more.

  • Three guiding principles for data security and compliance

    Sponsored by: IBM

    This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    This white paper talks about steps you should take to best protect your virtualized cloud data.

  • 7 Reasons to Deploy Retail Order Analytics

    Sponsored by: Prelert

    Retailers, especially those involved in eCommerce, are missing a prime tool that would help them run their business: data analysis. Access this resource to learn why data analytics is so important and how to keep your retail business competitive in a changing market.

  • How Shannon Medical Center is Scaling VDI

    Sponsored by: Pure Storage

    In this webcast, Mike Russell, Assistant IT Director at Shannon Medical, explains how VDI has enabled them to boost IT efficiency and patient care. Watch now to learn how to utilize flash storage to overcome the VDI I/O challenge and secure provider access to your desktops, clinical apps, and patient information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.