ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • When App is the Business, the Business is the App Vol. 3

    Sponsored by: IBM MaaS360

    IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Take Office 365 data security from the cloud into your own hands

    Sponsored by: Symantec Corporation

    This e-guide shows you four key security factors you must consider before you migrate into the cloud. Learn how to properly encrypt and backup sensitive information, without the risk of data leakage or breaches.

  • BI That's Compatible with the Microsoft Stack: Get Optimal Value from Your Investments

    Sponsored by: Pyramid Analytics

    Discover a BI platform that's compatible with the Microsoft data stack, offers self-service capabilities, and empowers you to share trusted BI content. Learn how you can deliver enterprise-grade governance and security, deploy on-premises or private cloud, and more.

  • IDC: Protecting Your SaaS Applications

    Sponsored by: TrendMicro

    Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • A Powerful Platform for Cloud Security Analytics

    Sponsored by: Exabeam

    Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.

  • Accelerate the Investigation Process to Find, and Root out Attackers

    Sponsored by: Exabeam

    User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.

  • Detect, Prioritize, and Respond to Modern Cyber Attacks

    Sponsored by: Exabeam

    They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.

  • Understanding the Impact of Flash Storage in Healthcare Environments

    Sponsored by: Pure Storage

    Storage experts Rich Seger and Bob Cormier discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.

  • Data Protection for All-Flash Storage Arrays

    Sponsored by: emc first distribution

    This brief white paper highlights a continuous availability and data mobility platform and an operational disaster recovery solution that protect all-flash arrays. Access now to see how you can integrate these technologies to ensure continuous data protection for your mission-critical workloads and enable any point-in-time recovery.

  • Moving from Monitoring to Blocking Content - 5 Best Practices

    Sponsored by: Intel Security

    Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.

  • Protect Company Data with Encryption & Remote Management

    Sponsored by: Intel Security

    Simplify your security enterprise security management with broad, centralized control with stronger and more efficient options for protecting endpoints. Stay ahead of emerging threats and improve user experience all will lowering the TCO to your organization.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • Five Tips to Help Protect Your Data - From passive monitoring to proactive protection

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Is data leaking out on your watch?

    Sponsored by: Intel Security

    Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim (whether it be from external threats or your very own employees).

  • End the E-Waste Epidemic. Do Your Part.

    Sponsored by: Iron Mountain

    Learn how to dispose of e-waste properly to both save the environment and save your organization from data loss.

  • Advance Enterprise Analytics with Self-Service and Governance

    Sponsored by: Pyramid Analytics

    Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.

  • Korott Labs trust Barracuda NextGen Firewalls for security, reliabilityand simple centralized management

    Sponsored by: Barracuda Networks

    What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.

  • The Productivity Transformation

    Sponsored by: IBM MaaS360

    Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.