Research Library

Powered by

Data Security Research

  • Data Theft Prevention for Healthcare

    Sponsored by: Raytheon|Websense

    This white paper outlines a data-centric approach to protecting data and staying in compliance without sacrificing efficient patient care.

  • Forging a New Future with Identity Relationship Management

    Sponsored by: ForgeRock

    Access this white paper to explore identity and access management (IAM) technology and its new role as a public-facing, secure, and accessible business enabler for employees, partners, prospects, customers, and devices.

  • Identity and Access Management Users Maximize Their ROI

    Sponsored by: ForgeRock

    Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.

  • Meeting the Storage Challenge for Exponential Data Growth

    Sponsored by: HGST

    This white paper discusses traditional storage limitations and highlights an archival system with pay-as-you-grow capacity that does not rely on expensive replication software. Learn how this cost-efficient data archiving solution can simplify your data and storage management, consolidate your backup, archive, and restore process, and more.

  • Saint Francis Hospital and Medical Center Streamlines Remote Access

    Sponsored by: Citrix

    In this brief case study, learn how the New England healthcare organization closed a major mobile device security gap and consolidated 1.3 million patient records.

  • Find The Right Cloud Service Provider For Your Organization

    Sponsored by: VMware

    Watch this brief video to examine a cloud network that provides customers with unprecedented levels of extensibility, flexibility, and choice of public and hybrid cloud services.

  • A Closer Look at Microsoft Office 365 Security

    Sponsored by: Rackspace

    This expert guide reviews the pros and cons of Office 365's security features. Access now to learn where Office 365's security falls short of your needs and what you can do about it.

  • Database Backup Service: Secure Backup in the Cloud

    Sponsored by: Oracle Corporation

    This white paper highlights a cloud Platform as a Service (PaaS) that delivers cloud-based storage for database backups. Read more to see how partnering with this PaaS can help your enterprise consolidate your infrastructure and provide a cost effective, scalable backup solution for your data.

  • Data Encryption and Redaction: A Review of Database Security

    Sponsored by: Oracle Corporation

    This SANS report examines the importance of database security and discusses measures you can take to make your databases impenetrable.

  • The Dissolution of Safe Harbour and What it Means for your Business

    Sponsored by: Acronis

    This white paper discusses the changes that European enterprises must make for their data security systems overseas in the wake of the dissolution of the Safe Harbour agreement. Read on to access 5 steps to help mitigate risk and put safe, compliant procedures in place to protect your data.

  • Protect Your Data More Efficiently

    Sponsored by: Dell, Inc.

    This white paper focuses on a disk backup appliance that uses deduplication to help reduce the amount of backup data stored and transferred for replication and disaster recovery purposes in your data center. Read on to see how this data-reduction technology can help your enterprise manage your backup systems.

  • Protect Your Intellectual Property and Customer Data From Theft and Abuse

    Sponsored by: TITUS

    This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.

  • How to Overcome Your SharePoint Migration Fears

    Sponsored by: K2

    In this white paper, learn how one third-party SharePoint tool can provide assurance that data and productivity remain intact during a cloud migration, and ensure that the systems and operations you move to the cloud are the right ones. Additionally, see frequently asked questions about cloud migration and their answers.

  • Methods for Secure, Large File Transfers

    Sponsored by: Axway

    Learn four key steps to keeping your network secure when big files exit your enterprise and low-cost options for secure,large file transfers in the enterprise in this exclusive, expert resource. Continue reading and discover how to make data exfiltration harder for hacker.

  • Safeguard Your Data, Productivity, and Reputation with Business Continuity and Resiliency

    Sponsored by: IBM

    This video focuses on a cloud managed backup resilience service that can help you attack threats head-on with customized consulting and cloud-based technologies to keep your data and your business always on. Watch this video to see how you can proactively defend your business against the unexpected.

  • Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization

    Sponsored by: Citrix

    Access this white to learn how desktop and app virtualization strategies are used to strengthen information security. You'll examine the challenges of maintaining information security in today's evolving enterprise environment and 10 benefits of using app and desktop virtualization for information security.

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.

  • Optimizing Patient Care with Desktop and App Virtualization

    Sponsored by: Citrix

    This white paper details the current challenges IT leaders face in healthcare and explains how application and desktop virtualization plays a central role in supporting clinical workflows. Learn how your peers are using virtualization strategies to improve patient care.

  • Top Use Cases for Desktop Virtualization

    Sponsored by: Citrix

    Access this infographic to learn the top eight issues driving IT toward desktop virtualization and how VDI helps IT teams empower their entire workforces, one project at a time.

  • HGST Strengthens CrossFit Data Storage

    Sponsored by: HGST

    This video details how one health and fitness company was able to increase efficiency and simplify storage management using an active archival system. Tune in to learn how you can lower your storage total; cost of ownership, easily scale capacity and performance, increase resiliency, and more.

  • Enhance Security with Hardware Based Memory Protection

    Sponsored by: Oracle Corporation

    This video discusses a hardware based memory protection system that improves security and reliability and can fit a multitude of different data center designs. Watch now to learn how this memory protection can improve your data center security, reliability, and efficiency.

  • Security and Performance in One Cloud Infrastructure

    Sponsored by: Oracle Corporation

    This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.

  • Masood Heydari Discusses the Key to Securing and Accelerating Databases and Applications

    Sponsored by: Oracle Corporation

    In this webinar, Masood Heydari discusses the next phase of hardware and software engineering. Tune in and find out how, by converging elements of database software onto processor silicon, technology has made a giant leap forward in making a fully encrypted data center.

  • Making "Things" Secure: Towards a Safer Internet of Things

    Sponsored by: Symantec Corporation

    This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.

  • Threat Intelligence Networks: The Next Generation

    Sponsored by: Symantec Corporation

    This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.