ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • 5 Questions to Ask Data Protection Vendors

    Sponsored by: Commvault

    Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.

  • Important Considerations for Comparing Data Protection Vendors

    Sponsored by: Commvault

    What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Building Better Business Analytics to Improve BI

    Sponsored by: Pyramid Analytics

    Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Learn about a business intelligence platform that empowers users outside of IT to dive into data with the security of a governed analytics environment.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • EU data protection: Essential guide

    Sponsored by: ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • The Evolution of Enterprise File Sync and Share

    Sponsored by: ibm box

    Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.

  • 10 Reasons You Should Consider Commvault for Data Protection

    Sponsored by: Commvault

    Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.

  • Guide to Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.

  • Remote and Branch Offices: Leveraging Modern Storage and Data Centers

    Sponsored by: Veeam Software

    This white paper explores how remote and branch offices (ROBOs) can build the modern data center, a highly virtualized environment that leverages up-to-date storage and has a cloud strategy in place. Uncover useful tips and options for setting up critical systems like backup, recovery, replication, and more.

  • Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond

    Sponsored by: Trustwave

    Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.

  • Operations Management with Veeam and VMware vSphere

    Sponsored by: Veeam Software

    Discover a virtualization platform designed to remediate system issues, optimize infrastructure capacity, and maintain the availability requirements of today's always-on enterprises. Read on to also utilize fast and flexible recovery of virtualized apps and data, uniting VM backup and replication.

  • New EU Security Requirements and You

    Sponsored by: Blue Coat Systems

    Discover new EU security requirements and learn what you can do to get ready. Create a holistic approach to data protection and infrastructure security to best avoid compliance risk.

  • 5 Ways to Achieve Big Data Protection

    Sponsored by: Commvault

    Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.

  • Build a Defense-in-Depth Security Approach

    Sponsored by: TrendMicro

    Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • Beyond Next-Gen: Defining Future-ready Endpoint Security

    Sponsored by: TrendMicro

    In this ESG report, discover how to achieve your desired level of high fidelity to get the most out of your endpoint protection. Learn how other organizations are buying their endpoint protection and make determinations for your own endpoint solution moving forward.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.