ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Best Practices for Web Application Security

    Sponsored by: White Hat Security

    Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.

  • Information Governance in Federal Agencies

    Sponsored by: Hewlett-Packard Company

    In this white paper, discover a 4 step plan for designing, managing, and retaining an information governance program to firm up security and gain granular control over data.

  • Driving Agility and Security with Data Center Consolidation

    Sponsored by: Fortinet, Inc.

    This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.

  • Compliance Penalties + Class Action Damages = Healthcare Budget Crisis

    Sponsored by: Absolute Software

    Examines the cost of a breach in the healthcare sector and why you need to go beyond encryption to protect your organization. View this webcast now for strategies to limit the exposure of your organization to security risks.

  • A Legal Practitioner's Guide To Mobility Risk

    Sponsored by: Absolute Software

    This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.

  • Financial Organizations: Controlling Secure Communications

    Sponsored by: IntraLinks, Inc

    In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.

  • Controlling Keys - How to Prevent Data Leaks

    Sponsored by: IntraLinks, Inc

    This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.

  • Case Study: Secure File Sharing with Investors

    Sponsored by: IntraLinks, Inc

    This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.

  • Securing Shared Files and Data

    Sponsored by: IntraLinks, Inc

    This case study explores how one aerospace and defense supplies leader was able to improve identity and access management (IAM) to classified files and documents and improve user experience and security. Read on now to learn how you can provision and secure data access to collaborators.

  • Breaking Bad: The Risk of Insecure File Sharing

    Sponsored by: IntraLinks, Inc

    This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.

  • An Inside Look at the Azure Active Directory

    Sponsored by: Microsoft

    In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD

  • Running the Risk: Why a Generation of Sharing Could Be Good for Business

    Sponsored by: Aruba Networks

    This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.

  • The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain

    Sponsored by: Absolute Software

    This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.

  • Dell Data Protection Infographic

    Sponsored by: Dell, Inc. and Intel®

    This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.

  • Optimal care for patients and their data

    Sponsored by: Dell, Inc. and Intel®

    Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.

  • Protecting Healthcare Data in a Mobile World

    Sponsored by: Absolute Software

    In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.

  • Responding to Unpopular HIPAA Disclosure Requirements

    Sponsored by: Absolute Software

    In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.

  • Critical Capabilities for Client Management Tools

    Sponsored by: Absolute Software

    This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.

  • Big Data Analytics: Safety in the Digital Era

    Sponsored by: SAS

    Cybercriminals cause a lot of damage. They destroy profits, erode customers' trust, and compromise safety. This white paper identifies the ways in which big data analytics improve online safety and security. Read on and explore the efficacy of big data analytics when faced with fraudsters.

  • Securing Shared Data through FSS systems

    Sponsored by: IntraLinks, Inc

    This case study explores how a robust file sync and share (FSS) system can secure data accessed by collaborators.

  • Protect your Employees and Data from Advanced Malware Attacks in Real-Time.

    Sponsored by: Dell, Inc. and Intel®

    This white paper outlines a new approach to malware prevention that protects data and users from employee targeted attacks. Find out how this three step approach to malware prevention can give you the most advanced endpoint protection for your organization.

  • Securing the Mobile Enterprise Environment

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.

  • Features and Benefits of VMware VSAN 6

    Sponsored by: VMware

    This expert guide inspects the pros and cons of VMware's vSAN 6.

  • Examining the Current Cyber Risks

    Sponsored by: Hewlett-Packard Company

    With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.

  • Today's Top Security Risks Revealed

    Sponsored by: Hewlett-Packard Company

    This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.