ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Develop Your Information Security Management System

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.

  • Solving Fundamental Data Quality Challenges

    Sponsored by: BDNA

    Data quality is one of the most important requirements for IT asset management (ITAM) and IT service management (ITSM). Find out what you need to do in the rationalization, refresh, security, automation and planning steps to improve your data quality, and your overall quality of life.

  • Moving Your Big Data Strategy to the Cloud: A How-To-Guide

    Sponsored by: Rackspace

    Big data priorities are shifting to address new demands. But legacy systems are becoming too expensive to maintain, causing many to look to the cloud for an answer. Explore the challenges of moving big data to the cloud, and discover how to overcome them.

  • Transform IT and Reduce Risk With Converged Infrastructure and Availability Software

    Sponsored by: Veeam Software

    This white paper discusses how converged infrastructure systems can be leveraged in tandem with availability tools to significantly enhance application availability, improve business agility, simplify IT operational management, lower costs, and mitigate risk.

  • Reliable Data Protection Designed for Virtualized Environments

    Sponsored by: Veeam Software

    Modernizing your data center can seem overwhelming, especially when you consider the exponential data growth you can expect to realize every year. Access this white paper to learn about data protection and backup for virtualized environments.

  • Backup and Disaster Recovery: VMware on IBM Cloud with NetApp AltaVault

    Sponsored by: IBM

    Download this resource to examine a strategy for securely backing up data in and to the IBM cloud using the cloud-integrated appliance highlighted here. Learn how to enact efficient data retrieval with built-in WAN optimization and deduplication, and security for data on-site, in-transit, and at rest within the cloud.

  • Master the Internet of Things

    Sponsored by: VMware

    The Internet of Things (IoT) is ready to change the world, but it has a list of challenges to tackle. Watch this video to learn how you can use a single management platform that enables you to make the most of your IoT investment and overcome those challenges.

  • How Italian Insurance Consortium Tightened Data Security

    Sponsored by: One Identity

    In this case study, learn how an Italian insurance consortium delivered skilled support to its customers while also maintaining their systems and ensuring data security and compliance.

  • What the new EU data protection rules mean for IT marketers

    Sponsored by: ComputerWeekly.com

    The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.

  • 6 Key Security Considerations for Responsible Cloud Migration

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.

  • Information Protection in the Web and Cloud Era

    Sponsored by: Symantec & Blue Coat Systems

    Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.

  • Safe Adoption of Cloud Applications

    Sponsored by: Symantec & Blue Coat Systems

    Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.

  • Financial Services & GDPR: The Path to Compliance

    Sponsored by: Informatica

    In financial services institutions, there are challenges to overcome when it comes to data: An overabundance of customer data, enterprise data governance isn't a widespread practice, and disparate technology to manage data. Learn how complying with the General Data Protection Regulation (GDPR) can help you overcome some of these challenges.

  • Offline Access Is the Key to Unlocking Mobility's Promise

    Sponsored by: OnBase by Hyland

    Discover the importance of incorporating offline capabilities into the business critical apps, platforms, and systems that mobile workers access to execute the key functions of their day-to-day jobs. Find out how to overcome the offline challenge and answer the demand for mobile access with the OnBase ECM offering.

  • Managing IoT Data: What to Consider

    Sponsored by: Bayshore Networks

    In this interview with Carrie MacGillivray, the vice president for IDC's IoT and mobility teams, learn about two key issues: How to protect IoT data, and how to transform it into meaningful insights that enhance decision-making.

  • Managing Machine Data from POS, IoT, Sensors, and Other Data Sources

    Sponsored by: Splunk

    This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security.

  • Middleware and Operating System Machine Data

    Sponsored by: Splunk

    This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.

  • The Essential Guide to Machine Data

    Sponsored by: Splunk

    This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches.

  • GDPR: Understanding Your Data

    Sponsored by: Informatica

    As you prepare to comply with the General Data Protection Regulation (GDPR), you must have a full understanding of the challenges you'll face in order to overcome them smoothly. Join Patrick Dewald and Guiseppe Mura of Informatica to learn how to prepare your company for the GDPR.

  • Windows 10: The Unavoidable Upgrade

    Sponsored by: Citrix

    Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user's chosen endpoint device or operating system. Learn how.

  • The Security Compliance Countdown

    Sponsored by: Citrix

    Businesses everywhere are bracing for the GDPR takeover. See what issues are causing IT anxiety and learn what you can do to get ahead.

  • Moving Mountains: Tackling Disparate Systems with Data Integration

    Sponsored by: Globalscape

    This e-book explores how to create a data integration roadmap for complex, disparate systems management. Discover how to mitigate potential data security risks and reduce maintenance costs with managed file transfer (MFT), and uncover 4 signs that you're facing disparate systems challenges.

  • Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them

    Sponsored by: Globalscape

    Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.

  • Your Data in the Cloud: Steps to a Seamless Migration

    Sponsored by: Globalscape

    90 percent of organizations are looking at moving away from their legacy systems and into crafting a cloud strategy. Making a move to the cloud is a shift forward in many ways, and can empower organizations to accomplish much more with less. In this eBook, you'll learn about several cloud migration strategies.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.