ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Top Trends That Will Shape CIAM in 2018 and Beyond

    Sponsored by: Janrain

    In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

  • Revolutionizing the Sharing Economy

    Sponsored by: Evident

    According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.

  • Executive Review: Consumer Identity and Access Management

    Sponsored by: Janrain

    Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.

  • Cloud-based backup services are a safety net in tricky times

    Sponsored by: SearchDataBackup.com

    Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.

  • Accelerate Your Response to the GDPR

    Sponsored by: Oracle

    This paper summarizes several key requirements of the GDPR and maps out how you can accelerate your response and comply with the regulation by May 2018.

  • Revolutionizing the Sharing of Personal Data

    Sponsored by: Evident

    The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.

  • CASB Podcast

    Sponsored by: Oracle

    This brief podcast reveals the importance of Cloud Access Security Brokers (CASB) and how they can advance your security posture, without having an effect on the end users.

  • 8 Things to Know About a Secure Web Gateway

    Sponsored by: Symantec

    Given the evolving way web and cloud app are used and the constantly shifting threat landscape organizations must confront, proxy architecture is more important than ever in terms of security. This editorial brief provides 8 things to know about a secure web gateway and the benefits it can deliver to your security posture.

  • Cloud Essentials: Better Security Within the Cloud

    Sponsored by: Oracle

    According to Crowd Research Partners, 91% of organizations have security concerns about adopting the cloud and only 14% believe traditional security is enough. Explore this white paper to uncover strategies for implementing a secure cloud platform by safeguarding all aspects of the cloud including technology, processes and people.

  • Helping Address GDPR Compliance

    Sponsored by: Oracle

    The GDPR promotes the use of best practices and well established security concepts. This white paper offers a security strategy leveraging GDPR in order to gain a security strategy that addresses threats, reduces risks, and maintains continuous compliance.

  • Instaclustr Blackberry Case Study

    Sponsored by: Instaclustr

    Learn how BlackBerry deployed a NoSQL database for its IoT platform to handle data intake and application scaling requirements.

  • Get Shadow Data Under Control

    Sponsored by: Symantec

    A new era of information security is dawning. According to TechCrunch, by 2020 we'll have 6.1 billion smartphone users. With this connectivity, sharing data over the internet can be hazardous. Access this infographic to learn about the challenges and risks with data and how GDPR could be the answer to helping improve your security.

  • Extend DLP to the Cloud

    Sponsored by: Symantec

    This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.

  • What Every CISO Needs to Know About Cyber Insurance

    Sponsored by: Symantec

    The impact of a cyberattack to an organization's brand, reputation, and business operations can be catastrophic. Access this white paper to learn about why the implementation of cyber insurance can help improve your security posture and mitigate your risks of a cyberattack.

  • Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW

    Sponsored by: Symantec

    While next-generation fire walls provide value to enterprises, they do not replace a secure web gateway technology. This solutions brief offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Access this asset to learn about how the two complement each other and can improve your security posture.

  • Get Smart About Cloud Security

    Sponsored by: Oracle

    The average cost of a data breach to a company is $3.5 million. This infographic provides helpful clues to advance your cloud security to mitigate the risks of encountering data breaches and other malicious attacks.

  • Cloud Security: The 5 Fears

    Sponsored by: UKFast

    With cloud security on the tip of everyone's tongue, which fears are justified? Which can be mitigated? Which are just overplayed? And what's changing in the cloud landscape? This white paper offers 5 fears of cloud security along with best practice checklists to ensure proper security measures are taken.

  • How to Get More Personal Data Without the Risk

    Sponsored by: Evident

    According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.

  • Email Threats: An ISTR Special Report

    Sponsored by: Symantec

    According to the ISTR Email Threats Report, approximately 8,000 businesses each month are targeted by BEC scams. Explore this ISTR Special Report to uncover staggering email threat statistics, including insight into emails infected with malware, spambots, spam, and more.

  • 4 Questions Every Information Security Leader Must Answer

    Sponsored by: Symantec

    As a leader of security within your organization, it's your job to combat attacks and mitigate the damage. This e-book offers 4 questions every information security leader must answer to determine the strength of your organization's security across every stage of an attack lifecycle.

  • 5 Super Powers to Help You Master the Data Governance Universe

    Sponsored by: Collibra

    Conquering data governance may seem like a superhuman task. But when you activate these five super powers, it gets a whole lot easier. Read this e-book to uncover why data governance isn't a technology problem, how to make sense of your data – and drive true value from it and what the biggest data governance challenge is (hint, it's not the data!).

  • Using Security Automation for Continuous Deployment Cycles in the Cloud

    Sponsored by: CloudPassage

    Explore this article to uncover ways to advance and automate your cloud security to emphasize speed, flexibility and integration to keep up with the shift to the progressive DevOps practices.

  • Fighting Against Authorized Push Payment (APP) Scams

    Sponsored by: HID Global

    This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.

  • How to Avoid Being the Victim of a Data Breach

    Sponsored by: Evident

    There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.

  • Ten Steps for Successful Application Platforming in the Cloud

    Sponsored by: Atos

    Most organizations are trying to copy the success of "cloud first," like Uber and Netflix, but doing so is a compllicated process that often lead to increased complexity that further slow necessary progress. This paper addresses this and explores ten tips for a successful digital transformation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.