ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Analyst Perspective: How Smart Businesses Use the Cloud

    Sponsored by: Commvault

    In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Deploying an EFSS Solution: Six Steps for Success

    Sponsored by: BlackBerry

    This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.

  • Why Enterprises Need Trustworthy Data

    Sponsored by: IBM

    In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.

  • Developing Data Integration and Lifecycle Management Strategy for a Hybrid Environment

    Sponsored by: IBM

    Examine the four pillars for successful information governance in hybrid environments and how to implement a successful integration and lifecycle strategy. Access now to see how you can improve the reliability, flexibility, and scalability of your data integration, management, security, and analytics solutions.

  • HEIDELBERG Simplifies Backups and Restores Flexibility

    Sponsored by: Hewlett Packard Enterprise

    Access this case study to learn how one printing press manufacturer combined hardware and software to better align its IT and business goals with its backup needs.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.

  • Backup Solution Vendors: Reviews from the Tech Community

    Sponsored by: Hewlett Packard Enterprise

    With enterprise technology, you can't simply rely on the word of vendors. Access this list of user reviews to hear what your peers objectively think about various data backup and protection solutions.

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Visual Analytics: Easily Explore Data to Make Decisions You Can Trust

    Sponsored by: TIBCO Software Inc.

    Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.

  • Experts Discuss the Benefits of Unified Virtual Server Data Protection

    Sponsored by: Commvault

    In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.

  • Consider Security in your Daily Business Operations

    Sponsored by: IntraLinks, Inc

    This e-guide teaches you the importance of collaboration on a micro level for defending your organization against cyber threats. Learn how to embed security practices in your daily business practices and embrace a flexible mindset as your business needs change.

  • Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software

    Sponsored by: Pure Storage

    This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled them to access their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.

  • A Mobile Device Management Platform for the Modern Enterprise

    Sponsored by: IBM MaaS360

    Discover in this data sheet how to leverage an easy-to-use cloud platform to enforce end-to-end management of all mobile devices in your enterprise. Seamlessly integrate this cloud-based mobility management with your infrastructure and equip yourself with its MDM essentials.

  • Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service

    Sponsored by: Cloudian

    This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.

  • The Changing Landscape of Data Usage

    Sponsored by: Commvault

    In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.

  • Managed file transfer: Minimizing risk and strengthening compliance in data exchange

    Sponsored by: IBM

    This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.

  • Network security stack: How and why to consider adding new layers

    Sponsored by: OpenDNS

    This e-book teaches you about new tools to fully protect your employees wherever they go. Discover a cloud-delivered security that shores up your defenses and gets in front of attacks even as they increase in sophistication.

  • Three Considerations for Modernizing Data Protection

    Sponsored by: Hewlett Packard Enterprise

    In this report, you'll learn why backup is the cornerstone of a data protection strategy. Access now to uncover what you can do to ensure top security initiatives are met with solid data protection and backup policies, along with other top IT concerns.

  • Case Study: API Gateway Secures Public APIs and Minimizes Costs

    Sponsored by: Axway

    APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.

  • Future Proof your Data Storage with the Hybrid Cloud

    Sponsored by: Equinix

    This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.

  • MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments

    Sponsored by: Vision Solutions

    In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.

  • Cyber Liability: Risks, Ramifications, and Mitigation

    Sponsored by: eSentire

    Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.

  • The Truth Behind Why DRaaS is Gaining Popularity

    Sponsored by: Vision Solutions

    This white paper reveals why disaster recovery as a service (DRaaS) is gaining popularity among organizations looking to enhance their disaster recovery strategy. Read on and you'll gain insight into this rapidly growing service and discover 5 reasons to consider DRaaS, 6 must-have features to look for in a DRaaS provider, and more.

  • How Cloud Services Giant Exostar Protected Sensitive Data and Applications

    Sponsored by: VMware, Inc.

    In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.