ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • Why Data Protection Is the Cornerstone of Modern Enterprise Security

    Sponsored by: Symantec & Blue Coat Systems

    According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.

  • A 5 Minute Guide to Cognitive Search for the Life Sciences

    Sponsored by: Attivio, Inc.

    Learn about cognitive search platforms and find out how to analyze any type of data, integrate behavioral data to personalize user experiences, scale for big data, enhance data security, and more.

  • Endpoint Security - Market Quadrant 2016

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.

  • AWS Security Checklist

    Sponsored by: Amazon Web Services

    Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.

  • Introduction to AWS Security Processes

    Sponsored by: Amazon Web Services

    This white paper offers an explanation of how AWS can help protect your data to the nth degree.

  • Proofpoint Threat Response

    Sponsored by: Proofpoint, Inc.

    How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.

  • Encrypting Data at Rest

    Sponsored by: Amazon Web Services

    This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.

  • Security at Scale: Governance in AWS

    Sponsored by: Amazon Web Services

    Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.

  • Secure Content Delivery with Amazon CloudFront

    Sponsored by: Amazon Web Services

    As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.

  • Architecting for HIPAA Security and Compliance on Amazon Web Services

    Sponsored by: Amazon Web Services

    AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.

  • AWS Key Management Service Best Practices

    Sponsored by: Amazon Web Services

    This white paper details how you can use the AWS Key Management Service to protect sensitive information across 5 core areas, including identity and access management, detective control, and more.

  • SAP HANA and IBM Power Systems: Better Together

    Sponsored by: EOH IBM

    If you're looking to accelerate your ability to leverage SAP data and generate real-time insights, you may want to consider examining the servers that support your key apps and databases like SAP HANA. Learn about IBM Power Systems and how they measure up when compared to traditional x86-based servers.

  • Meet Compliance Regulations for Long-Term Record Management

    Sponsored by: Arkivum

    Organizations in the life sciences, pharmaceutical and health markets need to meet strict regulations for data lifecycle and long-term record management. Explore this brief tech overview to uncover the benefits of digital archiving in the healthcare industry.

  • Preparing for the Big One: General Data Protection Regulation

    Sponsored by: Smarsh

    Even if your organization is not physically located in the EU, the GDPR will most likely affect you as well. In this white paper, gain insight into GDPR requirements and what your organization must do to comply.

  • Case Study: Efficiently Archiving Electronic Clinical Trial Data

    Sponsored by: Arkivum

    The electronic archiving of clinical trial data is a regulatory requirement for many authorities. This case study explores how a Japanese top 10 pharmaceutical company leveraged a long-term e-archiving strategy to manage millions of pages from clinical trials.

  • A Practical Guide for GDPR Compliance

    Sponsored by: Smarsh

    GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.

  • Harnessing the Potential of SAP HANA with IBM Power Systems

    Sponsored by: EOH IBM

    Discover how you can increase the flexibility of your SAP HANA deployment to capitalize on its disruptive potential and get the facts about IBM's Power Systems.

  • Information Lifecycle Management: Harness The Power Of Your Data

    Sponsored by: Cintra

    Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.

  • The Top 5 Myths of Data Breaches

    Sponsored by: FireMon

    Debunking myths is an important step to improve the effectiveness of security defenses against future breach attempts. This white paper discloses who and what is at risk of a data breach and reveals the top 5 myths of data breaches.

  • Protecting Data After the Digital Disruption

    Sponsored by: Proofpoint, Inc.

    Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.

  • Empowering IT with Distributed Capture Scanner Technology

    Sponsored by: Kodak Alaris

    Take the next step on your digital transformation journey and discover how distributed capture technology can help IT departments ensure a fast, secure flow of data through the enterprise, improve user experiences, manage unstructured data volumes, and accelerate document management.

  • Best Practices of Third-Party Software Security

    Sponsored by: Veracode, Inc.

    This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.