ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Solution Guide: Optimize VM Backup and Recovery

    Sponsored by: Commvault

    This brief resource highlights a VM backup and recovery solution that provides end-to-end VM backup, recovery, and cloud management. Access now to discover the features and benefits that your enterprise can leverage, including server virtualization and cloud-ready data management, integrated archiving and eDiscovery, and more.

  • IBM 2015 Cyber Security Intelligence Index for Information and Communication

    Sponsored by: IBM

    This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.

  • Compliance Beyond Email: Navigating the Complexities within Healthcare

    Sponsored by: Actiance

    This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.

  • 2015 Frost & Sullivan Asia-Pacific Intrusion Detection & PreventionVendor of the Year - IBM

    Sponsored by: IBM

    This white paper shows you how greatly IDS/IPS is growing in Asia Pacific are other methods they are using to stay ahead of advanced threats. Access now to improve your organization's awareness of these threats and prepare yourself against sophisticated threats in the future.

  • 2015 Gartner Group Magic Quadrant on Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Stop the Bad Guys Cold: Securing Your Mobile Data

    Sponsored by: Commvault

    This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.

  • Harness the Power of Array-Based Snapshots to Accelerate Backup and Recovery

    Sponsored by: Commvault

    This white paper highlights a snapshot management solution that streamlines and simplifies complex processes to make snapshots more valuable and effective at protecting and recovery data and applications. Read on to see how you can take advantage of this solution to unify your data protection and recovery across all storage tiers.

  • A Foundation for Next-Generation Datacenter and Cloud-Based Security

    Sponsored by: Citrix

    Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM

    This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.

  • An Overview of Today's Most Wanted Cloud Storage Features

    Sponsored by: EMC

    Tune into this video to watch Diana Gao, Senior Product Marketing Manager at EMC, illustrate the latest storage market trends, address existing challenges that IT managers face with traditional storage and public cloud management, and discover one cloud storage solution that can cater to all of your needs.

  • 10 Questions to Ask Your Vendor about File Gateway Consolidation

    Sponsored by: IBM

    When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.

  • How Healthcare Organizations Both Enable Mobile Users and Stay Compliant

    Sponsored by: BlackBerry

    Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.

  • Governing in the Cloud

    Sponsored by: EMC

    The cloud is transforming IT and data storage, but government and large public organizations have obvious restrictions on how they can use the public cloud to store data. Access this microsite to how the government is benefiting from on-premise object storage.

  • Top Reasons to Choose EMC Isilon Scale-Out NAS

    Sponsored by: EMC

    This white paper highlights 8 reasons why your enterprise should consider investing in a scale-out NAS solution with a single volume, single file system architecture. Access now and discover how you can improve your storage scalability, efficiency, and flexibility, and expand your data lake.

  • Next-Generation IPS in the Era of Targeted Attacks

    Sponsored by: IBM

    This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.

  • Data Center Applications Standards Reference Guide: Networking and Storage

    Sponsored by: CommScope

    In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.

  • The Power of Collaboration with an Expiration Date

    Sponsored by: BlackBerry

    This white paper teaches you about data-centric security which embeds persistent controls in your files so they are always protected no matter where they are shared. Access now and find out how you can protect your most important assets – your privacy and your business data.

  • Storage Analyst Discussion: The Shift to Array-Based Snapshots

    Sponsored by: Commvault

    In this webcast, Senior Storage Analyst, Dave Simpson, discusses the shift to array-based snapshots that integrate backup software and hardware to create a more efficient, holistic data protection solution. Watch now to see how you can manage all of your arrays under one platform and transform stagnant data into a business resource.

  • Six Tools Users Need for Mobile Files And How to Provide Them Securely

    Sponsored by: BlackBerry

    This white paper identifies and details the key tools users need and outlines what IT should consider in evaluating these products. Access now to discover how you can safely access, share, sync and collaborate on even the most sensitive files through any device.

  • EMC ScaleIO: Software-defined, Scale-out SAN

    Sponsored by: EMC

    Growing infrastructures are a major challenge for data center operation teams. Access this data sheet to learn about a solution to keep your infrastructure from being what holds your business back.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Try Box for 30 Days

    Sponsored by: IBM

    What if you could securely transfer large files? Start your 30 day trial for Box now, and protect your company's sensitive data with comprehensive mobile security, encryption, and more before putting it in the hands of trusted partners.

  • Securing the Internet of Things: 6 Crucial Steps

    Sponsored by: Hewlett-Packard Enterprise

    Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.

  • Software-Defined Scale-Out NAS: Simple and Efficient Storage for Enterprise Edge Locations

    Sponsored by: EMC

    This white paper discusses a software-defined storage solution with scale-out NAS that extends the data lake to enterprise edge locations. Read on to learn how this solution can reduce your costs and simplify management by consolidating your unstructured data, eliminating inefficient storage silos, and streamlining data protection.

  • Traditional Backup Vs. Modern Data Protection

    Sponsored by: Commvault

    From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.