ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Potential ROI of Fraud Detection and Prevention Tools

    Sponsored by: BAE Systems

    This Forrester Total Economic Impact report examines an analytical platform that provides organizations with the tools to detect, investigate, and prevent insurance fraud while minimizing the impact to genuine customers. Discover the potential ROI of this fraud detection and prevention platform, deployed either on-premise or in the cloud.

  • Do You Know Who I Am? Know Your Customer Systems Market Update

    Sponsored by: BAE Systems

    Explore how Know Your Customer (KYC) systems provide organizations with the processes and workflows they need to assess the risk customers pose both at account opening and over time. Learn how to leverage KYC to boost customer onboarding and due diligence, improve risk management, integrate AML with KYC systems, and more.

  • How Effective is Your AML Auditing?

    Sponsored by: BAE Systems

    This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Ransomware: Everything You Need to Know

    Sponsored by: Cisco Systems, Inc.

    Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.

  • Anti-Money Laundering: Combatting Rising Threats and Meeting Regulations

    Sponsored by: BAE Systems

    With the cost of non-compliance continuing to rise, learn how banking and financial institutions are bolstering their anti-money laundering (AML) systems. Plus, discover how to derive further value from AML platforms by leveraging their ability to provide a multi-sourced, dynamic, and up-to-date view of customer account data to create key insights.

  • Data Protection & Privacy: Next Steps and 5 Best Practices

    Sponsored by: HPE and Intel®

    The internet and data privacy laws have been on a collision course for some time now – and it's accelerated by digital transformation sweeping across companies. Inside, explore the challenges that global businesses face when confronting the policy environment, and find 5 best practices to help you meet evolving data privacy and security demands.

  • Digital Remote Monitoring and How it Changes Data Center Operations and Maintenance

    Sponsored by: APC by Schneider Electric

    A lot happens in 10 years, and data center remote monitoring services have come a long way. Access this white paper to learn about digital remote monitoring services, how they support your data center and mobile technologies, and why it's time to replace any lingering offline monitoring.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Secure Information Exchange in the Digital Age

    Sponsored by: OpenText

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Disaster Recovery Guide: DR in Virtualized Environments

    Sponsored by: Macquarie Cloud Services

    Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.

  • Seeking secure Wi-Fi

    Sponsored by: MicroScope

    An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending

  • Omnichannel Authentication: Balancing Humanity and Technology

    Sponsored by: NICE Systems, Inc

    Learn how to make authentication processes less cumbersome for your customers with technology for secure, simple engagement.

  • 6 Questions Answered About Safe Harbor Getting Struck Down

    Sponsored by: Symantec & Blue Coat Systems

    This infographic quickly answers 6 common questions asked about the repercussions of Safe Harbor being struck down including the origins of the ruling, who the ruling applies to, how to comply with cloud systems, and more.

  • Complying with the European General Data Protection Regulation

    Sponsored by: Quest

    Access this white paper now to learn what GDPR compliance means to your organization, what steps you must take to remain compliant, key GDPR provisions, and more.

  • Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation

    Sponsored by: Matrix42

    This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.

  • Enabling Secure Collaboration across Microsoft Tools and Devices

    Sponsored by: Box

    This paper explores how to leverage a collaboration platform in conjunction with popular Microsoft tools like Office 365, Windows, Intune, and Outlook. Discover how to manage content securely and easily across mobile and desktop devices to empower users to sync, share, edit, and collaborate with up-to-date versions of all of your important files.

  • Building the Business Case for Cloud Backup

    Sponsored by: Druva Software

    Download this resource to overcome legacy VM data protection complexity with cloud-native backup and recovery. Discover why enterprises employ this method as a cost-effective alternative to traditional DR by learning 5 reasons for migrating backup and archiving to a single, cloud-native platform.

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • Manage Application Security Risks to Help Protect your Organization’s Critical Data

    Sponsored by: IBM

    Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Tackling Insider Threats

    Sponsored by: Intel Security

    Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.