ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise

    Sponsored by: Kaspersky Lab

    A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • The Definitive Guide to Data Loss Prevention

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts

  • Management of Native Encryption for Apple FileVault and Microsoft BitLocker

    Sponsored by: Intel Security

    With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack.

  • Data Protection Considerations for Converged Infrastructure

    Sponsored by: Veritas

    Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.

  • Keep Cloud Applications Secure During The DevOps Process

    Sponsored by: CloudPassage

    To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.

  • George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture

    Sponsored by: Gigamon

    Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.

  • Three Critical Considerations to Achieve Information Governance

    Sponsored by: Commvault

    Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • IBM Data Protection for Virtual Environments

    Sponsored by: IBM

    Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.

  • Streamline Your Financial Data Planning to Improve Efficiency

    Sponsored by: IBM

    As market conditions continue to shift, it's more important than ever to minimize time spent managing data. Discover real-time analytics that allow you to link operational changes to financial results, so you can identify and influence key drivers of costs, sales, and revenue.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • Add Flexibility to Your Storage with SDS

    Sponsored by: IBM

    This e-guide explores software-defined storage (SDS) as a method for managing and protecting long-term data. Read on to see how SDS can provide your enterprise with an added layer of flexibility for long-term data preservation.

  • Complete Data Protection

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • Business Intelligence: Enable Flexibility Without Sacrificing Security

    Sponsored by: Pyramid Analytics

    Today's enterprises demand self-service BI to efficiently gain insights, but they also need centralized security. Discover a BI platform that enables flexibility and speed without sacrificing security or control. Learn how you can easily conduct complex analyses, generate rich visualizations, scale to match increased user needs, and more.

  • Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

    Sponsored by: IBM MaaS360

    Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.

  • The Basics of Cloud App Integration

    Sponsored by: Oracle Corporation

    Your organization is ready to move to the cloud in order to reap its benefits, so all you need to do is crank out applications—easy, right? Amy Reichert, seasoned software tester, elaborates on the types of cloud app integration, and you will discover the different challenges they present to testers and data integration.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.