ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • A Powerful Platform for Cloud Security Analytics

    Sponsored by: Exabeam

    Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.

  • Accelerate the Investigation Process to Find, and Root out Attackers

    Sponsored by: Exabeam

    User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.

  • Detect, Prioritize, and Respond to Modern Cyber Attacks

    Sponsored by: Exabeam

    They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.

  • Understanding the Impact of Flash Storage in Healthcare Environments

    Sponsored by: Pure Storage

    Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.

  • Data Protection for All-Flash Storage Arrays

    Sponsored by: emc first distribution

    This brief white paper highlights a continuous availability and data mobility platform and an operational disaster recovery solution that protect all-flash arrays. Access now to see how you can integrate these technologies to ensure continuous data protection for your mission-critical workloads and enable any point-in-time recovery.

  • Moving from Monitoring to Blocking Content - 5 Best Practices

    Sponsored by: Intel Security

    Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.

  • Protect Company Data with Encryption & Remote Management

    Sponsored by: Intel Security

    Simplify enterprise security management with broad, centralized control and stronger, more efficient options for protecting endpoints. View now to stay ahead of emerging threats with proven TCO-friendly solutions that lock down endpoints and keep data secure without dragging down user or mobile-workforce productivity.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • Five Tips to Help Protect Your Data - From passive monitoring to proactive protection

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Is data leaking out on your watch?

    Sponsored by: Intel Security

    Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim (whether it be from external threats or your very own employees).

  • End the E-Waste Epidemic. Do Your Part.

    Sponsored by: Iron Mountain

    Learn how to dispose of e-waste properly to both save the environment and save your organization from data loss.

  • Advance Enterprise Analytics with Self-Service and Governance

    Sponsored by: Pyramid Analytics

    Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.

  • Korott Labs trust Barracuda NextGen Firewalls for security, reliabilityand simple centralized management

    Sponsored by: Barracuda Networks

    What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.

  • The Productivity Transformation

    Sponsored by: IBM MaaS360

    Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • 10 Characteristics of a HIPAA-Compliant ePHI Application

    Sponsored by: Coalfire

    The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.

  • Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

  • Gemalto SafeNet KeySecure

    Sponsored by: Gemalto

    This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.

  • Enterprise Class Solid State Storage Performance Evaluation

    Sponsored by: IBM

    Evaluate a flash storage solution that combines multiple options for data protection and high-availability, with high performance. Access the test findings of this technology to help your enterprise determine if flash adoption is the next step in boosting your storage infrastructure.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Best Practice Approach to Database Backup and Recovery

    Sponsored by: Veritas

    Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.

  • 2015 the Year Data Breaches Got Personal

    Sponsored by: Gemalto

    Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.