Research Library

Powered by

Data Security Research

  • The Security Risks of Network Sensors in the Enterprise

    Sponsored by: IBM

    In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.

  • Leverage Real-Time Protection from Advanced Web Threats

    Sponsored by: Trustwave

    Discover a real-time web protection strategy that can target modern malware threats. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.

  • Data Lakes for Dummies

    Sponsored by: Dell EMC

    Download this e-book to delve into the depths of the data lake, and discover how with it you can manage unstructured data flexibly, securely, and adaptively. Serve the increased reach of your enterprise by leveraging scale‐out storage architecture and automated tiering to manage massive data growth.

  • Top 5 Pitfalls to Avoid in Your Data Protection Strategy

    Sponsored by: HDS and Veritas

    Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.

  • Simple, Secure Access to All Your Synced Content

    Sponsored by: IntraLinks, Inc

    You need to provide your employees with a way to work collaboratively and securely with external partners, otherwise they may put your content at risk. Watch this quick video to learn how to securely collaborate and share files with external partners.

  • Protecting the Distributed Enterprise

    Sponsored by: Fortinet, Inc.

    Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security.

  • Having Trouble Sharing Content Externally?

    Sponsored by: IntraLinks, Inc

    While most companies are fixing their security breaches and data leaks, they aren't addressing the security gaps that come from external content sharing. Access this blog to learn how to ensure secure collaboration between internal and external partners, and make sure that your security efforts don't go to waste.

  • Enable Collaboration without Compromising Content

    Sponsored by: IntraLinks, Inc

    Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what one non-profit organization did to ensure that they could maintain their collaborative efforts without compromising content.

  • Elevating The Design and Manufacture of World-Class Helicopters with vGPU-enabled VDI

    Sponsored by: NVIDIA

    Non-GPU virtualization deployments couldn't keep up with the graphics-intensive apps Bell Helicopter, a globally recognized helicopter design and manufacturing business, required. Find out how graphics accelerated VDI delivered the graphics application performance they were looking for.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • Enable Data Protection in the Cloud

    Sponsored by: Commvault

    Discover a holistic platform that addresses data management and protection needs, spanning from your data center to your multi-cloud environment. Learn how to orchestrate complex end-to-end processes with custom workflow automation engines that let you set it and forget it.

  • It's 2016— Do You Know Where Your Content and Data Is?

    Sponsored by: IntraLinks, Inc

    Do you know where your content goes once it leaves the company? Who can access it? There's been so much focus on accessing content faster and from further away, but we've lost track of security. Access this blog to learn about data sovereignty and how to track your data no matter where it goes.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

  • Build Vs. Buy: Calculate the TCO of BDR

    Sponsored by: Datto

    Calculate the economics of a build-your-own vs. a complete backup and disaster recovery (BDR) offering from this profitability checklist. Read on to get the full picture of the TCO of BDR, factoring in upfront and ongoing costs, as well as operating expenses into your decision to build or buy.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • 2016 State of the Channel Ransomware Report

    Sponsored by: Datto

    93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.

  • Ransomware Made MSPeasy

    Sponsored by: Datto

    In the first 3 months of 2016, companies lost $200 million to ransomware. Learn about today's leading ransomware threats and how to educate your customers on the importance of investing in security, backup and recovery solutions.

  • Discover the Most Important App Security Testing Basics

    Sponsored by: Synopsys

    Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.

  • What Are The Security Benefits of Using Thin Client Devices?

    Sponsored by: Dell, Microsoft and Citrix

    Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.

  • Top 4 Reasons to Adopt Data Lifecycle Management

    Sponsored by: Iron Mountain

    This white paper examines the top 4 reasons why you must focus on deploying data lifecycle management as a strategic initiative. It also explores where and how to use specific solutions, along with the benefits of working with a partner that can offer a comprehensive approach to data lifecycle management.

  • Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage

    Sponsored by: Dell EMC

    David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

  • No Downtime, No Problem. Silverstring Protects Customers and Their Data

    Sponsored by: Neustar

    Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.