Research Library

Powered by

Data Security Research

  • Veritas Enterprise Vault Health Check Tool: Monitor, Analyze and Report on Areas of Critical Importance

    Sponsored by: Globanet Veritas

    This data sheet highlights an enterprise vault health check tool that provides automated Veritas Enterprise Vault archive analysis and reporting to help with the performance and integrity of your key data archives.

  • Compliant Digital Identity Protection for Healthcare

    Sponsored by: VASCO Data Security International

    Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.

  • Data Archiving Solutions - Archive Data with Industry Leading Systems

    Sponsored by: Globanet Veritas

    All types of companies rely on their data and need archiving solutions to protect it. This resource center highlights a service provider that deploys industry-leading archive systems and solutions for organizations worldwide. Learn about this provider's professional on-site and remote support that can meet your organization's every need.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by:

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • 5 Steps to Keeping Your Data Safe with a Content Mobility Solution

    Sponsored by: Hitachi Data Systems

    Explore a 5 step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.

  • Data Access Governance Solutions Demo

    Sponsored by: STEALTHbits

    StealthAUDIT for DAG is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting. Click on the download now button to request a live demonstration of the Data Access Governance solutions.

  • The Rising Face of Cyber Crime Ransomware

    Sponsored by: BitSight

    Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.

  • IT Project: Storage Architecture ASEAN

    Sponsored by:

    When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Comparative Overview of File Sync and Share Platforms

    Sponsored by: Hitachi Data Systems

    Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.

  • Disaster Recovery’s Treacherous Terrain

    Sponsored by: IBM

    Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • File Sync and Share: There’s Too Much at Stake to Compromise

    Sponsored by: Hitachi Data Systems

    Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.

  • Get the Most Out of Your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Masters of Disaster Recovery: How Highly Resilient Organizations Excel

    Sponsored by: IBM

    Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.

  • Securing & Enabling the Mac-empowered Enterprise

    Sponsored by: Code42

    This white paper explains how you can create a comprehensive security program for your business. Learn how to implement self-service restoration, total data visibility for your IT department, techniques for securely integrating Macs into your traditionally PC environment, and more.

  • Reeling in Ransomware Data Protection for You and Your Users

    Sponsored by: Code42

    In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Accelerating Digital Transformation with Data-Driven Security

    Sponsored by: Akamai

    This IDC report talks about digital transformation as a top driver for the IT industry and its security implications today. Discover how to keep sensitive files secure and your organization running smoothly even through the shift.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

  • Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection

    Sponsored by: Code42

    With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.

  • Two-Factor Authentication Protects Health Data

    Sponsored by: VASCO Data Security International

    Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.

  • Safeguarding Vital Data Is a Battle You Can Win

    Sponsored by: Intel Security

    In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.

  • Policing cyber crime

    Sponsored by:

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • Securing Data Access Within the Healthcare Industry

    Sponsored by: VASCO Data Security International

    Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.