ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations

    Sponsored by: Accenture

    Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.

  • Lightning-Fast Virtual System Recovery

    Sponsored by: arcserve

    Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.

  • Best Practices for Oracle Database High Availability and Data Protection

    Sponsored by: Oracle Corporation

    Hear from Bill Callahan, Director and Principal Engineer of CCC Information Services, Inc. about integrated hardware and software from Oracle that can reduce the cost and complexity of HA, eliminate data loss, increase ROI, and more.

  • Case Study: Defending Mobile Apps from Attacks

    Sponsored by: Arxan

    Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.

  • Major Global Bank Secures Their Mobile Applications

    Sponsored by: Arxan

    Learn how a major global banking leader was able to pave the way for mobile banking security to protect critical cryptography and authentication routines in their app that manages communication with the banking server.

  • Six Steps to a Better Security Strategy

    Sponsored by: Armor

    This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.

  • Stop Future Threats though Careful Examination of the Malware Lifecycle

    Sponsored by: Check Point Software Technologies Ltd.

    This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.

  • Infographic: 2016 Cybersecurity Report

    Sponsored by: IBM

    Get insight into recent cybersecurity incidents and beyond in this short infographic. Learn what security events occurred most prevalently in 2015 and what you can do to protect your organization moving forward.

  • HIPAA Compliance & Risk Management

    Sponsored by: Armor

    Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.

  • Are You a Security-First Organization?

    Sponsored by: Armor

    Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • Case Study: Outwood Grange Academics Trust Ensures Teaching Continuity with UDP

    Sponsored by: arcserve

    Explore one organization's decision to deploy a Unified Data Protection (UDP) solution to streamline and protect their diverse IT infrastructure and backup tools. By implementing this UDP system, your enterprise can reduce your backup windows and storage needs, achieve longer data retention times, and more.

  • How Automation Provisions and Maintains Physical, Virtual, and Cloud Servers

    Sponsored by: BMC

    Find out how you can accelerate vulnerability resolution, lower costs of remediation, and avoid major security incidents with automated management, control, and enforcement of server configuration changes in the data center and cloud.

  • Protected Health Information Data Breach Report

    Sponsored by: Verizon

    Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.

  • Stay One Step Ahead of Cyber Attacks

    Sponsored by: Verizon

    Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.

  • Best Practices for Monitoring Today's Murky Threat Environment

    Sponsored by: Hewlett Packard Enterprise

    In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.

  • Data Science Roles and Industries Infographic

    Sponsored by: IBM

    This infographic helps you see how the different members of the data science team perform the necessary actions associated with analytics. Learn how building a strong team can improve insights in a variety of industries, ranging from education to banking and finance.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • State of Application Security Report

    Sponsored by: Arxan

    You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.

  • It’s Time for a “Protect From Within” Mentality

    Sponsored by: Forcepoint

    It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast, "A Business Case for Funding Your Insider Threat Program,"for an in-depth look at how to establish an insider threat program and protect your organizations most important data.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2

    Sponsored by: Intel Security

    Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • 6 Pillars of Big Data: How to Harness Data with Tableau

    Sponsored by: Tableau Software

    Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • A Business Case For Funding Your Insider Threat Program

    Sponsored by: Forcepoint

    Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.

  • Advantages vs. Disadvantages of Taking a "Hack Back" Approach to Cyber Crime

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.