ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Case Study: How A Global Agro-Industrial Leader Established Security To Grow On

    Sponsored by: Cisco Umbrella

    In this case study, learn how Avril Group, a major industrial and financial group in France, used Cisco Umbrella to establish consistent security coverage across a distributed global organization that continues to expand through acquisitions.

  • Prepare Your Business For The General Data Protection Regulation (GDPR)

    Sponsored by: Lepide Software

    Issues relating to data privacy continue to hit the headlines on a regularbasis. The European Union have introduced the General DataProtection Regulation (GDPR), which is designed to replace the currentData Protection Directive (DPD). Learn about key considerations you'll need to consider when preparing for the GDPR.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • 3 Ways to Help Stop Data Leakage in Your Organization

    Sponsored by: Lepide Software

    It seems that almost every month there's another high-profile security breach in which sensitive data is leaked. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the company's involved. In this guide, learn 3 ways you can help prevent data leaks within your organization.

  • Product at-a-Glance: Cisco Umbrella for Network Security

    Sponsored by: Cisco Umbrella

    In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. But today, more and more is happening off-network. It's important to adapt your security to fully protect your enterprise. In this product overview, learn about Cisco Umbrella for network security.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • How to Track Privileged Users' Activities in the Active Directory

    Sponsored by: Lepide Software

    Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.

  • The Smart, Secure Cloud for the UK

    Sponsored by: Google Cloud

    This document gives an overview of how security is designed into Google's technical infrastructure. Read on to learn about the lengths to which Google has gone to provide a level of security that you need in order to have confidence in your cloud deployments.

  • AI, Risk-Based and Context: Trading in Your Password for the Intelligent Future

    Sponsored by: Crossmatch

    Weak and stolen passwords lead to data beaches, but how do you get rid of them? Join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.

  • Enable Visibility and Protection in the Cloud-Connected Enterprise

    Sponsored by: Cisco Umbrella

    How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • Composite Authentication: Understand Security Beyond Passwords

    Sponsored by: Crossmatch

    82% of breaches are caused by lost, easily hacked or stolen passwords, according to the Verizon DBIR. In this transcript, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.

  • Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World

    Sponsored by: HyTrust

    Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?

  • Unified Endpoint Management for Dummies

    Sponsored by: IBM

    Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.

  • Optimizing Data Management Across the Application Lifecycle

    Sponsored by: Delphix

    Businesses look to applications to differentiate themselves from competitors. As a result, applications are generating more data than ever before, making it increasingly difficult and costly to manage data across disparate systems. Learn 10 tips to remove data constraints in software development across the application lifecycle.

  • How UTHealth Medical Center Handles Data

    Sponsored by: Virtual Instruments

    As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.

  • Reducing Risk and Increasing Flexibility for the Mobile Enterprise

    Sponsored by: Citrix

    Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.

  • Workspaces of the Future

    Sponsored by: Citrix

    Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • Reducing Risk and Increasing Flexibility for the Mobile Enterprise

    Sponsored by: Citrix

    Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.

  • 4 Ways to Reduce the Risk of Ransomware

    Sponsored by: Citrix

    In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.

  • GDPR and Citrix ShareFile

    Sponsored by: Citrix

    The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.

  • Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

    Sponsored by: ComputerWeekly.com

    Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals.

  • 3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

    Sponsored by: Citrix

    When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.

  • 3 Ways EFSS Enables Secure Content Collaboration

    Sponsored by: Citrix

    The sudden influx of personal devices, mobile apps, and cloud technologies requires you to establish new ways to safely share data and documents. This white paper discusses the importance of enterprise file sync and share (EFSS) in securing the future of your digital workplace.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.