ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Securing the Most Important Apps and Data—Yours

    Sponsored by: Citrix

    Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Demand More from Data Center Management Services

    Sponsored by: Hewlett-Packard Enterprise

    91% of IT decision-makers are looking to a third party to help develop and execute their IT strategy. Access this Frost & Sullivan white paper to learn why IT leaders are turning to service providers to help manage their data center strategy and how to select the right provider for your business needs.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.

  • Protecting Your Business in the Digital Transformation Journey

    Sponsored by: Hewlett-Packard Enterprise

    As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.

  • Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery

    Sponsored by: QuorumLabs Inc.

    Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.

  • The 5 Rings of Data Integration Hell Impacting Your Security

    Sponsored by: Globalscape

    In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.

  • How The US Navy Helped Transform Today's BDR Market

    Sponsored by: QuorumLabs Inc.

    This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Security for the Future-Ready Workforce

    Sponsored by: Dell India

    To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.

  • Survey Findings: Data Security

    Sponsored by: Dell India

    This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.

  • Reviewing the Current State of Hyperconvergence and Benefits of Virtual SAN Deployments

    Sponsored by: VMware

    Discover the top 2016 trends driving organizations to deploy hyperconverged infrastructure. Read on to also see illustrated the benefits achieved from HCI built on virtual SAN for 3rd Platform technologies.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.

  • Manage Risk by Protecting the Apps and Data that Drive Business Productivity

    Sponsored by: Citrix

    Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.

  • Two-Factor Authentication Helps Officers Protect and Serve New York

    Sponsored by: BlackBerry

    Learn how the field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents, keep their database safe, and enable secure mobility.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • IDC Technology Spotlight: Modern "Embedded" Endpoint Security

    Sponsored by: Absolute

    This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.

  • Secure Email Against Targeted Phishing Attacks

    Sponsored by: Symantec & Blue Coat Systems

    To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.

  • Discover the Cloudification of Healthcare IT

    Sponsored by: Pure Storage

    Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.

  • Tackle Insider Threats Head-On By Building A Proactive Security Culture

    Sponsored by: Intel Security

    More than 40% of data loss is caused by company insiders. Use this white paper to find ways your company can reduce the chance of internal data loss by fostering a trusted security culture, creating employee profiles, and more.

  • Clayton Utz Achieves Information Security and Data Protection Goals

    Sponsored by: Hewlett-Packard Enterprise

    In this case study, you'll learn how one law firm ensured simple administration of the rapid growth in data for themselves and their clients. Read on and discover ways to support business and IT requirements for cost-effective data storage.

  • How to Determine if Cloud ERP Software is Right for You

    Sponsored by: Sage Software

    Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • Eight Emerging Data Center Trends to Follow in 2016

    Sponsored by: Chatsworth Products Europe

    Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.