ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation

    Sponsored by: MobileIron

    This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.

  • Empower Innovation with the Right Unified Collaboration Strategy

    Sponsored by: IBM

    Not only can effective collaboration tools better meet standards for enterprise security, but the business benefits are profound and well-documented. Discover integrated, cloud-based tools that can improve ROI, lower TCO, increase efficiency and user satisfaction, and more.

  • Data Protection Steps for Ransomware

    Sponsored by: TechTarget

    Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.

  • 4 Signs Your In-House Data Management is Untenable

    Sponsored by: Paramount Software Solutions

    Data management isn't exactly your organization's top priority, so there's a chance that you are overlooking some pain points. Access this white paper to learn 4 data management pain points to 2017 that will keep your data accessible and secure.

  • Jargon buster guide to GDPR

    Sponsored by: ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Dell EMC Data Protection Suite Enterprise Edition Solution Specifications

    Sponsored by: Dell and Microsoft

    Inside learn about what you can gain by adopting the Dell EMC Data Protection Suite Enterprise Edition

  • Making the Case for Modern, Hybrid Laptops in the Legal Profession

    Sponsored by: Microsoft

    Modern work means using modern tools – and to find out how legal professionals utilize technology like laptops, desktops, and tablets, Microsoft commissioned a survey of 300 solicitors, barristers, clerks, and paralegals. Learn how intuitive, hybrid laptops modernize work, helps secure data, and more.

  • Data Governance: Embracing Security and Privacy

    Sponsored by: Tealium

    With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.

  • The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds

    Sponsored by: Nutanix

    Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.

  • The Definitive Guide to Hyperconverged Infrastructure

    Sponsored by: Nutanix

    Hyperconverged infrastructure has emerged to become the building block of your enterprise cloud. Access this comprehensive guide to learn everything you need to know to get started in your search for a hyperconverged infrastructure platform.

  • 5 Steps To Defining Your Data Retention Policies

    Sponsored by: Iron Mountain

    Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps.

  • Investing in the Data Center to Meet Modern Customer Demands

    Sponsored by: Red Hat

    Data center modernization is one way to boost digital transformation and innovation efforts. Read on to see what Forrester found in their research on how organizations are going about their modernization, the benefits they are realizing, and more.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

  • Identify and Manage Fraud Better with Analytics

    Sponsored by: BAE Systems

    This white paper explores how to put the right analytics tools and practices in place to fight financial crime in an era of cloud and big data. Discover how predictive analytics can help identify fraudulent behavior and improve strategic decision-making even in the face of high data volumes and proliferating attack vectors.

  • Infographic: A New Dawn for Data Privacy

    Sponsored by: Symantec & Blue Coat Systems

    EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.

  • Digital Innovations and Changing Demographics are Redefining Government by the People, for the People

    Sponsored by: HPE and Intel®

    Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.

  • CW Europe – March 2017

    Sponsored by: ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • Advanced Detection of Existing, New and Evolving Cybersecurity Threats

    Sponsored by: BAE Systems

    According to security experts, SIEM is currently catching less than 1% of successful advanced threats. Learn how to go beyond SIEM and discover how to incorporate a data platform with advanced threat analytics, big data capabilities, and an investigation console into your cybersecurity strategy.

  • Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses

    Sponsored by: BAE Systems

    Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

  • The Essential Guide to Storage for DevOps

    Sponsored by: Tintri

    When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.

  • The Essential Guide Data Protection and Disaster Recovery

    Sponsored by: Tintri

    Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.

  • EMM Real Benefits in Today's Mobile World

    Sponsored by: vmware airwatch

    The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.

  • Five Key Indicators that You Need to Adopt EMM Now

    Sponsored by: vmware airwatch

    How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.

  • Customer Success Stories: Unified Endpoint Management

    Sponsored by: vmware airwatch

    End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.