Research Library

Powered by

Data Security Research

  • Software-Defined Storage Suite Transforms Data Capabilities

    Sponsored by: IBM

    In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.

  • Case Study: i-Virtualize Builds an Agile Architecture with VersaStack

    Sponsored by: IBM

    i-Virtualize, a cloud MSP, decided to implement a pre-integrated infrastructure stack that would provide them with the flexibility and versatility necessary to respond quickly and efficiently to customers' changing business needs. Witness how this agile architecture can increase your infrastructure's efficiency while reducing your TCO and risk.

  • Your Guide to Trusted Backup and Recovery Software Solutions

    Sponsored by: IBM

    Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • Is Your Data Secure?

    Sponsored by: Commvault

    Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.

  • Enterprise Apps OWASP Mobile Security Risks Report

    Sponsored by: Wandera

    This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.

  • Best-of-Breed Next-Generation Security For the Mid-Market

    Sponsored by: Barracuda Networks

    Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.

  • Content Security in the Cloud Era

    Sponsored by: Barracuda Networks

    Discover a cloud-based approach to content filtering and other benefits for network user and administrators. Learn the most effective new approaches to cloud security in the face of the changing security landscape.

  • The Security Risks of Network Sensors in the Enterprise

    Sponsored by: IBM

    In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.


    Sponsored by: Trustwave

    Discover a better answer to target malware within this white paper. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.

  • Data Lakes for Dummies

    Sponsored by: Dell EMC

    Download this e-book to delve into the depths of the data lake, and discover how with it you can manage unstructured data flexibly, securely, and adaptively. Serve the increased reach of your enterprise by leveraging scale‐out storage architecture and automated tiering to manage massive data growth.

  • Top 5 Pitfalls to Avoid in Your Data Protection Strategy

    Sponsored by: HDS and Veritas

    Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.

  • Simple, Secure Access to All Your Synced Content

    Sponsored by: IntraLinks, Inc

    You need to provide your employees with a way to work collaboratively and securely with external partners, otherwise they may put your content at risk. Watch this quick video to learn how to securely collaborate and share files with external partners.

  • Protecting the Distributed Enterprise

    Sponsored by: Fortinet, Inc.

    Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security.

  • Having Trouble Sharing Content Externally?

    Sponsored by: IntraLinks, Inc

    While most companies are fixing their security breaches and data leaks, they aren't addressing the security gaps that come from external content sharing. Access this blog to learn how to ensure secure collaboration between internal and external partners, and make sure that your security efforts don't go to waste.

  • Enable Collaboration without Compromising Content

    Sponsored by: IntraLinks, Inc

    Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what one non-profit organization did to ensure that they could maintain their collaborative efforts without compromising content.

  • Elevating The Design and Manufacture of World-Class Helicopters with vGPU-enabled VDI

    Sponsored by: NVIDIA

    Non-GPU virtualization deployments couldn't keep up with the graphics-intensive apps Bell Helicopter, a globally recognized helicopter design and manufacturing business, required. Find out how graphics accelerated VDI delivered the graphics application performance they were looking for.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • Enable Data Protection in the Cloud

    Sponsored by: Commvault

    Discover a holistic platform that addresses data management and protection needs, spanning from your data center to your multi-cloud environment. Learn how to orchestrate complex end-to-end processes with custom workflow automation engines that let you set it and forget it.

  • It's 2016, Do You Know Where Your Content Is?

    Sponsored by: IntraLinks, Inc

    Do you know where your content goes once it leaves the company? Who can access it? We have focused so much on accessing our content faster and from further away, but we might have lost track of security. Access this blog to learn how about data sovereignty and tracking your data no matter where it goes.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.