ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • Secure Locations for Your IT Platforms

    Sponsored by: BT

    It is critical to maintain the balance between critical business data upkeep and facility security to host your IT systems. Learn about the cloud's role in making your network secure, sufficient, and sustainable while maintaining that necessary balance.

  • An Agent of Change in an Era of Intensifying Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Discover a defense system tailored specially for your network that includes advanced sandboxing with CPU-level detection. Take the on-going cyberwar back to your cyberthieves' doorsteps by understanding the tools they use, their chosen attack vectors and the methods they employ.

  • Computer Weekly – 20 September 2016: Digital giving – transforming Save the Children with technology

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

  • Root Out Ransomware

    Sponsored by: SearchSecurity.com

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Preventing Ransomware Threats to Health Data in 10 Steps

    Sponsored by: OpenDNS

    Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: OpenDNS

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • PACS Infrastructure in the Cloud: Addressing Security, Compliance, and TCO

    Sponsored by: Ambra

    Discover how to properly prevent the catastrophic loss of images, and optimize healthcare systems storage capacity, by deploying cloud-based archiving for the PACS infrastructure. Read on to create a highly agile environment for sharing and receiving medical data, and secure all expanding images on-demand.

  • Measures to Protect Our Growing Data

    Sponsored by: Pure Storage

    The data deluge has arrived and at any one time, federal agencies will store an average of 2.63 petabytes. Flash storage provides the capacity, performance and cost-effectiveness needed but still leaves the question of security. Read on to learn how governments intend to keep their data safe and secure.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • 2016 Data Threat Report: Trends in Encryption and Data Security

    Sponsored by: Vormetric

    Access this report now to learn statistics from around the globe describing how large enterprises are misplacing their security dollars and what you can do to best protect your sensitive data in today's hostile cyber environment.

  • Achieving Maximum Backup Granularity

    Sponsored by: Veeam Software

    Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.

  • Magrath LLP Protects Global Infrastructure with DRaaS

    Sponsored by: Databarracks

    Today's legal IT landscape has shifted – and one of a law firm's biggest fears is the threat of ransomware and the potential disruption it could cause. Find out how one law service implemented a DRaaS to deliver fast and secure recovery from any ransomware attack.

  • STEALTHbits Solutions for Addressing Real World Security and Compliance

    Sponsored by: STEALTHbits

    This document discusses four deployments of STEALHbits and how these organizations fit the solutions into their existing infrastructure.

  • Data Access Governance Solutions On-Demand Demo

    Sponsored by: STEALTHbits

    This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.

  • Grow Your Business with NetApp and Veeam

    Sponsored by: Veeam Software

    Discover how NetApp and Veeam backup and recovery products can provide your enterprise with an efficient disaster recovery and availability solution. By combining these products, your enterprise can benefit from accelerated enterprise application performance, easy data protection and recovery, a cloud-ready data center, and more.

  • Allow Your Enterprise Greater Mobile App Security

    Sponsored by: MobileIron

    This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.

  • Microsoft Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware, Inc.

    Learn how you can best take control of Office 365's anytime-anywhere collaboration while also maintaining secure access to corporate data. Explore three steps designed to help you realize this goal quickly and securely.

  • Open Access

    Sponsored by: STEALTHbits

    Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.

  • Buyer's Guide - DAG

    Sponsored by: STEALTHbits

    This white paper will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.

  • The Access Governance Challenge

    Sponsored by: STEALTHbits

    This white paper explores the challenges of practicing Data Access Governance (DAG) in the world of unstructured, or human-generated data. Take a look at how the control of access to unstructured data is distributed between Active Directory and the data repository where the data is stored.

  • Data at Rest: Pragmatic Approach to Data Security

    Sponsored by: STEALTHbits

    There are also risks associated to having all that data spread throughout the IT ecosystem. Discover the risks associated with unstructured data and how to best approach these risks. Understand why getting a handle on your data at rest can get you the security results you desire.

  • 4 Countermeasures to Protect Against Ransomware

    Sponsored by: TrendMicro

    Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.

  • Computer Weekly – 13 September 2016: Dell Technologies aims for an intelligent, connected future

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Best Practices for Your Disaster Recovery/Business Continuity Plan

    Sponsored by: McKesson Corporation

    In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.