ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Discover the Cloudification of Healthcare IT

    Sponsored by: Pure Storage

    Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.

  • Tackle Insider Threats Head-On By Building A Proactive Security Culture

    Sponsored by: Intel Security

    More than 40% of data loss is caused by company insiders. Use this white paper to find ways your company can reduce the chance of internal data loss by fostering a trusted security culture, creating employee profiles, and more.

  • Clayton Utz Achieves Information Security and Data Protection Goals

    Sponsored by: Hewlett-Packard Enterprise

    In this case study, you'll learn how one law firm ensured simple administration of the rapid growth in data for themselves and their clients. Read on and discover ways to support business and IT requirements for cost-effective data storage.

  • An MSP Guide to Selling IT Security

    Sponsored by: Solarwinds MSP

    Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.

  • Overcome Storage Capacity Conundrums of Genomics and Precision Medicine

    Sponsored by: Pure Storage

    Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.

  • Revitalizing Storage Infrastructure: AUT Tackles Expanding Data Problems

    Sponsored by: Hewlett-Packard Enterprise

    Follow Aukland University of Technology's journey to discovering a secure storage platform that radically improved their ability to deliver high performance storage capabilities to staff and students. Discover how they enabled better data management, shored up their infrastructure with enhanced backups, and more.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience

    Sponsored by: TIBCO Software Inc.

    Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • 5 Questions to Ask Data Protection Vendors

    Sponsored by: Commvault

    Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.

  • Important Considerations for Comparing Data Protection Vendors

    Sponsored by: Commvault

    What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Building Better Business Analytics to Improve BI

    Sponsored by: Pyramid Analytics

    Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Learn about a business intelligence platform that empowers users outside of IT to dive into data with the security of a governed analytics environment.

  • When "Free" is not Free: The True Costs of Open Source

    Sponsored by: Rogue Wave Software

    In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • How Midmarket IT Leaders Can Improve Their Data Security

    Sponsored by: Arctic Wolf Networks, Inc.

    This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.

  • EU data protection: Essential guide

    Sponsored by: ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • The Evolution of Enterprise File Sync and Share

    Sponsored by: ibm box

    Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.

  • Eight Emerging Data Center Trends to Follow in 2016

    Sponsored by: Chatsworth Products Europe

    Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.