ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Prevent Full-Blown Breaches with Threat Response and Incident Intelligence

    Sponsored by: Proofpoint, Inc.

    The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.

  • Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Beware the Beastly Threats of IT security

    Sponsored by: Lenovo

    It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.

  • 7 Keys to Unified Data Protection Vendor Evaluation

    Sponsored by: Veritas

    Having a unified data protection platform is the way to ensure that your data is both secure and visible. Access this white paper to see gain an understanding of what to look for in a vendor and how two unified data protection vendors compare to each other based on 7 key aspects.

  • Unified Data Protection Vendor Comparison

    Sponsored by: Veritas

    Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on 7 key performance areas.

  • Vendor Comparison Based on Top 8 Data Protection Needs

    Sponsored by: Veritas

    Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on the top 8 data needs.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • SaaS Analytics: Safe and Certain Reporting

    Sponsored by: IBM

    In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • What to Consider Before Buying Database Performance Monitoring Tools

    Sponsored by: SearchDataManagement

    To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.

  • Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection

    Sponsored by: Druva Software

    Your organization has evolved to keep up with a rapidly changing business landscape. It's time to renew your data protection strategy. This e-book explores the single, unified data protection platform was implemented in 3 different vertical industries and its impact on each organization.

  • How Transactional Analytics is Enabling Digital Payments Transformation

    Sponsored by: Aerospike

    Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.

  • How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost

    Sponsored by: Wandera

    Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.

  • Hybrid Cloud for the Smart Company: Migrating from On-Prem to Cloud

    Sponsored by: Moogsoft

    Cloud isn't just a computing platform, but an entirely new way of doing business. Why are so many organizations pushing a cloud migration if it means changing how they operate? Watch this brief webcast to learn how enterprises are managing their cloud migration.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Don't Rush into Cloud Databases without a Well-Grounded Plan

    Sponsored by: Data Intensity

    In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.

  • Rethinking Enterprise Data Management: A 360-Degree View

    Sponsored by: Veritas

    Download to discover a strategy for navigating the enterprise data management slalom with data backup and protection tools as the foundation. Learn more about this 360-degree approach here, which digs into unstructured data and executes intelligent decisions on how to treat each data type.

  • Cloud Data Management Tailor-Made For Your Business

    Sponsored by: Veritas

    74% of organizations have a multi-cloud strategy and 71% operate in a hybrid cloud model. As this trend continues to grow, data visibility, protection, and simplified cloud migration are all taking center stage. Access this infographic to learn about these 3 cloud data management focus areas and how to factor them into your cloud strategy.

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: SearchSecurity.com

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Array Networks Secure Remote Access Case Study: City of Santa Barbara

    Sponsored by: Array Networks

    The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.

  • Fourth Generation Data Leak Prevention

    Sponsored by: Ghangor Cloud

    In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.

  • Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation

    Sponsored by: MobileIron

    This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.

  • Jargon buster guide to GDPR

    Sponsored by: ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.