ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Importance of the Facilitated Password Process for Enterprise Password Management

    Sponsored by: Fast Pass Corp

    According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.

  • DTMF Masking for PCI DSS Compliance

    Sponsored by: Semafone

    PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.

  • Extending Security Technology to the Cloud: Threat Detection & Response

    Sponsored by: RSA

    According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.

  • Essential guide to dealing with a data breach

    Sponsored by: ComputerWeekly.com

    Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences

  • Password Management and GDPR Compliance

    Sponsored by: Fast Pass Corp

    This IDC Technology Spotlight introduces the identity and access implications of GDPR, and shows why password reset represents a potential risk factor that may compromise compliance. Find out how self-service password reset can lower this risk to help your organization follow GDPR guidelines.

  • Business-Driven Security and the GDPR

    Sponsored by: RSA

    As the GDPR quickly approaches, privacy and data protection will no longer be "nice to have" benefits. Lacking them will become critical risks, both financial and reputational. Access this whitepaper for insight into data protection mandates in the GDPR and how your organization can get prepared.

  • Closing the Cloud Security Gap

    Sponsored by: West UC

    According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.

  • Secure the Workplace Without Locking Down Your People

    Sponsored by: Atos

    What if I told you that you could secure your workplace without taking away employees' flexbility? Read on to learn about the guidelines you need to follow to make this happen and the topics you will need to address for the future of your workplace security strategy.

  • Measuring Cybersecurity Preparedness

    Sponsored by: Dell SecureWorks

    According to the 2017 Cybersecurity Breaches Survey, 7 in 10 large UK enterprises experienced an attack or breach within the past 12 months. This Frost & Sullivan white paper reveals the overall cybersecurity preparedness of large UK organizations and places organizations in 3 categories: underprepared, in transition and security leaders.

  • Your GDPR Plan: 4 Steps to Bolster Security and Meet Compliance

    Sponsored by: Dell SecureWorks

    Getting GDPR compliant can be a valuable competitive differentiator between organizations. To maximize the benefits and minimize the security risks, taking the right approach to compliance is vital. This white paper reveals a 4-step plan to bolstering security to meet GDPR compliance standards.

  • A Data Privacy & Security Year in Review: Top 10 Trends and Predictions

    Sponsored by: Delphix

    Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.

  • Splunk's Top Predictions for AI, Machine Learning, IoT, and More

    Sponsored by: Splunk

    AI and machine learning, IoT, DevOps collaboration, security and more – how can you tell which factors will be a flash in the pan vs. trends that will have an everlasting effect on the shape of the data management landscape? Uncover Splunk's top predictions to find out what trends will help shape 2018.

  • Data Defense Doesn't Win Championships

    Sponsored by: Delphix

    Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.

  • Data Management Platforms for GDPR: Buyer's Checklist

    Sponsored by: Delphix

    Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.

  • GDPR Requirements for Data Masking

    Sponsored by: Delphix

    This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.

  • Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

  • You Need an Action Plan for the GDPR

    Sponsored by: SailPoint Technologies

    It's time to create an action plan to tackle GDPR. This 10-page Forrester Report offers GDPR assistance to security and privacy professionals in preparing data protection strategies to comply with 5 core requirements of the regulation.

  • Banking on Cybersecurity

    Sponsored by: HyTrust

    According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.

  • DataOps for Data Privacy and Security

    Sponsored by: Delphix

    Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.

  • Stopping the Insider Threat

    Sponsored by: SailPoint Technologies

    Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

  • Executing a Lockdown on Cybersecurity Threats

    Sponsored by: Navex Global

    Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.

  • Report: IAM Leadership Compass

    Sponsored by: Janrain

    This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

  • Effective Isolation and Workload Security in the Multi-Tenant Cloud

    Sponsored by: HyTrust

    A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.

  • Compare enterprise file-sync-and-sharing software and deployment options

    Sponsored by: Insight

    Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more.

  • Compare the top enterprise file-sync-and-sharing vendors

    Sponsored by: Insight

    Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.