ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • When "Free" is not Free: The True Costs of Open Source

    Sponsored by: Rogue Wave Software

    In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.

  • How Midmarket IT Leaders Can Improve Their Data Security

    Sponsored by: Arctic Wolf Networks, Inc.

    This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.

  • EU data protection: Essential guide

    Sponsored by: ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • The Evolution of Enterprise File Sync and Share

    Sponsored by: ibm box

    Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.

  • Secure Your Connected Medical Devices

    Sponsored by: Zingbox

    Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.

  • Expert Report for Enterprise File Synchronization and Sharing

    Sponsored by: ibm box

    70% of today's EFSS destination vendors will cease to exist, be acquired or be put out of business by 2018. Access this expert report to learn how EFSS vendors need to evolve in order to survive. Find out which vendor best meets your business' EFSS needs and which ones will last.

  • Three Mistakes IT Makes That Could Cost Your Organization Millions

    Sponsored by: Globalscape

    IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.

  • 10 Reasons You Should Consider Commvault for Data Protection

    Sponsored by: Commvault

    Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Four Countermeasures to Protect Against Ransomware

    Sponsored by: Trend Micro

    Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.

  • Best Practices for Ransomware Detection and Remediation

    Sponsored by: Arctic Wolf Networks, Inc.

    Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Access this expert resource to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Guide to Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.

  • Remote and Branch Offices: Leveraging Modern Storage and Data Centers

    Sponsored by: Veeam Software

    This white paper explores how remote and branch offices (ROBOs) can build the modern data center, a highly virtualized environment that leverages up-to-date storage and has a cloud strategy in place. Uncover useful tips and options for setting up critical systems like backup, recovery, replication, and more.

  • Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard

    Sponsored by: IBM

    This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.

  • Comprehensive Protections for Cloud Networks

    Sponsored by: Check Point Software Technologies Ltd.

    Uncover advanced threat prevention security for internal traffic inside a virtual infrastructure. Access now and explore scalability of security that adjusts to dynamic network changes, context-aware security policies that leverage security groups, and more.

  • Storage Outlook: Prepping for Upcoming Challenges and Opportunities

    Sponsored by: Oracle Corporation UK Ltd

    This e-book explores the outlook for storage technology, infrastructure, and management. Discover how to manage high volumes of data more efficiently, create cost-effective storage strategies for each tier, and prep for other developing challenges and opportunities that lie ahead.

  • Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond

    Sponsored by: Trustwave

    Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.

  • Healthcare Data Lake Simplifies Management and Improves Patient Insights

    Sponsored by: Dell EMC

    Learn how to simplify healthcare data management with a data lake that will not only eliminate the need for costly data migrations, but also seamlessly scale without downtime and move archived data to cloud tiers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.