ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Third-Party Risk Management: Evaluating and Contracting with Vendors

    Sponsored by: BitSight

    This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.

  • Yield Insight into Your Business Info with Data-Aware Storage

    Sponsored by: DataGravity

    This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Implementing Cloud-Based Disaster Recovery: Six Key Steps

    Sponsored by: CloudEndure Inc.

    In this e-guide, storage expert Brien Posey discusses how a cloud-based recovery site can be the key to reaching an effective DR strategy and can be extremely beneficial when a primary data center is incapacitated. Read on to learn the 6 important steps to consider when implementing a cloud-based DR solution.

  • Compliance Standards for Data Governance

    Sponsored by: Smarsh

    This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.

  • What Public and Hybrid Clouds Offer in the Cloud Market

    Sponsored by: SimpliVity

    Public cloud adoption has grown significantly over the past few years, as even the most skeptical IT pros admit the technology is right for certain use cases. This exclusive e-guide details the benefits and drawbacks of both public cloud and hybrid cloud adoption.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

  • Open Source Strategies Spark Security and Integration Concerns

    Sponsored by: Black Duck Software

    In this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • Computer Weekly – 16 February 2016: How AstraZeneca saved $350m by insourcing IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, saving $350m per year as a result. We ask if the new EU/US Privacy Shield agreement will protect citizens' data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now.

  • Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability

    Sponsored by: Symantec Website Security

    In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell, Inc. and Intel®

    This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell, Microsoft and Citrix

    This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Data Lake Architecture Concerns: Cost, Durability, and Security

    Sponsored by: Cambridge Semantics

    This e-guide uncovers expert insight on data lakes and how data virtualization and federation can help enterprises maintain data durability and security. Learn how these tools can help your enterprise better manage and analyze information in your data lake.

  • Computer Weekly – 26 January 2016: Beyond India – the emerging outsourcing destinations

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the growing number of offshore alternatives to the dominant outsourcing destination of India. We examine how to respond if your organisation is affected by a data breach. And we analyse how virtualisation technology can help improve your disaster recovery strategy. Read the issue now.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • High-performance computing storage environments

    Sponsored by: TechTarget Storage

    Storage magazine's January issue looks at 12 data storage company startups to watch in 2016, the rise of the cloud-based disaster recovery service, and the future of data storage.

  • December ezine: An issue covering cloud and security developments in the market

    Sponsored by: MicroScope

    Two of the most explosive opportunities in the channel are cloud and security and we look ahead to what the market holds for resellers operating in those areas.

  • Computer Weekly: How Cloud IT is Helping Uefa Meet Its Goals

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how cloud computing is helping European football federation Uefa with preparations for the Euro2016 tournament. We ask if government moves to support IT education are enough to close the skills gap. And we examine the new international standard for personal data privacy in the cloud. Read the issue now.

  • Cybersecurity and Privacy Compliance: The Delicate Balance

    Sponsored by: TechTarget Security

    This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.

  • Swiss Army Knife Security? How to Vet Integrated Tool Sets

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.

  • Information Security ANZ Nov 2015

    Sponsored by: TechTarget

    In this issue we look at the true cost of a data breach to an Australian organisation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.