ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Best Practices for Monitoring Today's Murky Threat Environment

    Sponsored by: Hewlett Packard Enterprise

    In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.

  • Data Science Roles and Industries Infographic

    Sponsored by: IBM

    This infographic helps you see how the different members of the data science team perform the necessary actions associated with analytics. Learn how building a strong team can improve insights in a variety of industries, ranging from education to banking and finance.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • State of Application Security Report

    Sponsored by: Arxan

    You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.

  • It’s Time for a “Protect From Within” Mentality

    Sponsored by: Forcepoint

    It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast, "A Business Case for Funding Your Insider Threat Program,"for an in-depth look at how to establish an insider threat program and protect your organizations most important data.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2

    Sponsored by: Intel Security

    Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • 6 Pillars of Big Data: How to Harness Data with Tableau

    Sponsored by: Tableau Software

    Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • A Business Case For Funding Your Insider Threat Program

    Sponsored by: Forcepoint

    Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.

  • Data Security for the Digital Businesses

    Sponsored by: HPE and Intel®

    How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.

  • Three Critical Steps to Launch a Data Breach Response

    Sponsored by: AllClear ID

    This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.

  • 7 Key Factors of a Highly Effective Application Protection Solution

    Sponsored by: Arxan

    An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.

  • Successfully Migrating Personnel Data from SAP ERP Human Capital Management to Employee Central

    Sponsored by: Accenture

    Before migrating personnel data to SAP's Employee Central, adjustments and modifications are necessary to legacy SAP ERP HCM data. This report introduces a solution that converts data for migration that focuses on quality, consistency, and protection against risk and errors.

  • How CISOs Tackle Insider Threat Data Protection

    Sponsored by: Forcepoint

    Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.

  • Privileged Users

    Sponsored by: Forcepoint

    Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.

  • Defeating the Threat Within

    Sponsored by: Forcepoint

    Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.

  • Webster Bank: Helping to stop online fraud before it happens

    Sponsored by: IBM

    Webster Bank found what they needed by deploying an endpoint-centric fraud prevention solution. They now can protect mobile and desktop devices against malware and phishing attacks before they occur. After only 12 months of usage, 224 infections were detected and resolved, helping prevent the possibility of millions of dollars lost due to fraud.

  • Breach response: It's about keeping your customers safe

    Sponsored by: AllClear ID

    Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.

  • Breach response isn't about losing data. It's about keeping your customers.

    Sponsored by: AllClear ID

    The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.

  • What I've Learned from 5,000 Data Breaches

    Sponsored by: AllClear ID

    As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.

  • Protecting Your Business in the DigitalTransformation Journey

    Sponsored by: HPE and Intel®

    Businesses are responding to security threats in various ways as they go about their digital transformation. This white paper examines these threats and explains how to adopt a comprehensive approach to protection and resilience.

  • The Business Value of Data Deduplication

    Sponsored by: Richardson Eyres

    Discover a data deduplication system that can dramatically improve backup, recovery, and archiving processes. Explore the benefits your enterprise can achieve with one data deduplication system, including reduced backup costs, simplified backup and recovery operations, increased flexibility, and more.

  • Power the New Style of Business: HPE Data Center Platform Consulting Services

    Sponsored by: Hewlett Packard Enterprise

    In this brochure, you will learn how HPE Platform Consulting Services can make your technology infrastructure environments more efficient and agile for the New Style of IT. It will also tell you how to take advantage of "on-demand IT" innovations such as cloud, converged, and software-defined technologies.

  • The Pros and Cons of Microsegmentation for your Virtualized Environments

    Sponsored by: NTT Com Security (UK) Ltd

    Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.