ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Protect and Recovery Data with Confidence

    Sponsored by: IBM

    This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.

  • Day in the Life of a Security Admin

    Sponsored by: RSA Softcat

    Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.

  • Onapsis Research Labs: SAP Systems Security Analysis

    Sponsored by: Onapsis

    This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: Hewlett Packard Enterprise

    For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.

  • Transform your "Good Backup" to Efficient App Availability And Recovery

    Sponsored by: Dell, Inc.

    Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.

  • Removing the Risk from Compliance in the Cloud

    Sponsored by: VMware

    Within this white paper, learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.

  • Ease Backup Woes with Cost-Efficient Data Archiving

    Sponsored by: Rubrik

    George Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.

  • You May Need Additional Backup to Prevent Data Loss From Your SaaS Solutions

    Sponsored by: Druva Software

    Gartner's latest research results compare and contrast the pros and cons of SaaS solutions for backup/recovery. Find out why SaaS may (or may not) fall short in preventing data loss as Gartner reviews Google Apps v. Microsoft Office 365 v. Salesforce.

  • Is Your MFT Ready for Digital?

    Sponsored by: Axway

    The data universe is expanding and cyberattacks are increasing. As more businesses go increasingly digital, file sharing grows in importance. Explore what it means to securely go digital and prepare your managed file transfer platform to do the same.

  • Digital Business: Managed File Transfer Solutions

    Sponsored by: Axway

    Discover a managed file transfer platform that bolsters your security during file transfer. Learn how to improve file sharing security by enabling central governance, limiting access to certain defined users, and more.

  • Information Security and Data Privacy Practices

    Sponsored by: Gigya

    Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • Use These Five Backup and Recovery Best Practices to Protect Against Ransomware

    Sponsored by: Druva Software

    Expert analysts reveal the top five backup and recovery best practices that enable you to defend against ransomware. Learn why your data is vulnerable to these attacks and how to repel them before you or your organization fall prey to attack.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Application Defense In Depth

    Sponsored by: IMMUNIO, Inc.

    The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.

  • Extracting actionable data from banking malware

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

  • SC Mag Reviews a SIEM Platform

    Sponsored by: LogRhythm, Inc.

    Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.

  • 5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare

    Sponsored by: Citrix

    Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.

  • Ransomware: Attack Trends, Prevention, and Response

    Sponsored by: Check Point Software Technologies Ltd.

    Deepen your understanding of ransomware, and learn how to better protect your business assets from these attacks. Uncover the challenges enterprises face and find best practices to prevent future ransomware attacks and limit their impact on your organization.

  • Realizing the Promise of a Data Lake

    Sponsored by: Zaloni

    From 2010 to 2020, the amount of data is expected to increase by 20 times, with 77% of relevant data being unstructured. Learn why enterprise data warehouses (EDWs) can't always deliver the necessary insights and discover how Hadoop data lakes can pick up where EDWs leave off.

  • Enterprise Mobility and Security: More than Just Device Management

    Sponsored by: Microsoft

    Enterprise mobility and security (EMS) offers more than simply mobile device management. Discover 5 central pain points that EMS can address, and how you can help improve your customers' experiences and needs when it comes to Office 365.

  • CIOs Harness Big Data's Potential with Red Hat Storage

    Sponsored by: Red Hat

    Discover how to simplify, scale, and unify data access and integration throughout the enterprise in order to fully harness the potential of big data. Access now to learn how CIOs can increase competitiveness by managing all data in all physical, virtual, and cloud environments with open-source storage.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.