ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Is your business risking a USD 100 million loss?

    Sponsored by: IBM

    Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • The Future of Endpoint Protection

    Sponsored by: Atos

    Discover how to best secure your endpoints against today's hostile threat environment. Learn how secure operations, secure technology and secure applications to protect corporate data against physical or digital theft.

  • ‘PowerShell’ Deep Dive: A United Threat Research Report

    Sponsored by: Carbon Black

    Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Calnet

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Encompass analytics and transaction processing with one platform

    Sponsored by: IBM

    Infrastructure is vital to retrieving value from your data. Watch this brief video to learn about an end-to-end solution that brings analytics and transaction processing to your data, minimizing cost and complexity risk associated with moving data to another platform, and keeps everything you need in one platform.

  • Application Control for Dummies

    Sponsored by: Carbon Black

    This eBook emphasizes best practices for choosing an application control platform and deployment of the solution. It's a quick, easy-to-understand guide, but comprehensive in its scope so you may improve your security posture as soon as possible.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: EMC and Arraya

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: EMC and Alphaserve

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: EMC and Netsync

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: EMC and Wrightcore

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: EMC and Calnet

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Is There a Hole in Your Castle Wall? Why Your Desktop May be Your Greatest Security Vulnerability

    Sponsored by: Aventura

    Explore a brief technology blueprint for securing sensitive healthcare information from hackers and security threats. Discover how to implement a healthcare organization security plan that protects your virtual desktops.

  • Banca Carige unlocks the growth potential of big data

    Sponsored by: IBM

    In this case study, learn how a major international bank harnessed the power of big data to gain valuable customer insights. Explore what technology they leveraged, strategies they implemented to access previously untapped business opportunities, and the biggest benefits they received from their new initiatives.

  • Mobile Application Security Report 2016

    Sponsored by: Hewlett Packard Enterprise

    Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.

  • The Breach Detection Gap and Strategies to Close It

    Sponsored by: Infocyte

    What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.

  • Clustering for Axway SecureTransport

    Sponsored by: Axway

    Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Leverage leading technologies to improve performance, management, scalability, and resiliency, so your MFT infrastructure is always available to support the way you, your customers, and your partners do business.

  • Employing Cyber Threat Intelligence

    Sponsored by: Anomali

    Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.

  • Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting

    Sponsored by: Proofpoint, Inc.

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • Case Study: How Republic Bank Monitors, Protects Sensitive Data

    Sponsored by: Imperva

    See how a national bank managed 100% uptime over a three-year period and ensured compliance across all servers in all locations. Learn how you can leverage behavioral analytics to mitigate risk and ensure that unauthorized personnel do not access sensitive client information.

  • How Tech-Savvy Workers are Affecting Enterprise Security

    Sponsored by: Unisys

    Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.

  • Axway SecureTransport Enhanced Managed File Transfer Gateway

    Sponsored by: Axway

    Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.

  • Pivot3 Marries Erasure Coding and Hyperconvergence

    Sponsored by: Pivot3

    Discover a hyper-converged infrastructure platform that implements scalar erasure codes to deliver higher storage efficiency and greater resilience than data replication. Explore how to enable efficient, resilient data protection in your hyper-converged environment.

  • The Impacts of Organizations Not Keeping Up with Cybercriminals

    Sponsored by: Proofpoint, Inc.

    Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Explore how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.