ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Miercom Report - Cisco Catalyst 3650

    Sponsored by: Cisco Systems, Inc.

    The Cisco Catalyst 3650 is an enterprise access switch – ideal for branch-office deployments. Models in this versatile switch series deliver a spectrum of capabilities. This Miercom report details some of the clear business benefits that the Cisco Catalyst 3650 delivers supported by the results of hands-on testing.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.

  • Future-Proofing Storage with Scale-Out Storage Software

    Sponsored by: Red Hat

    Discover an open, scale-out storage software solution that allows enterprises to deploy cost-effective, highly available storage without compromising scale or performance. See how this storage architecture can enable your enterprise to easily share and integrate your data without risking security.

  • Automated Test Data Creation: An IT Manager's Review

    Sponsored by: CA Technologies

    Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.

  • 3 Steps to Getting Data Access Governance off Your To Do List

    Sponsored by: STEALTHbits

    Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.

  • Build a Data Access Governance Program to Control Unstructured Data

    Sponsored by: STEALTHbits

    Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.

  • 314 Day Battle Plan - The Modern Cybercriminal's Attempt to Stay Undetected

    Sponsored by: Dell SecureWorks

    This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.

  • IDC: Rethinking the Network as a Security Sensor and Enforcer

    Sponsored by: Cisco Systems, Inc.

    Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.

  • Making File Sharing Easy in a Virtual Environment

    Sponsored by: Citrix

    Learn how a new file sharing program can improve collaboration inside and outside the organization, reduce storage cost, and equalize the experiences of working on a physical or virtual desktop.

  • NGFW Requirements for SMBs and Distributed Enterprises

    Sponsored by: Cisco Systems, Inc.

    Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • How To Get the Most Out of SOCs

    Sponsored by: ServiceNow

    This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.

  • The New Security Paradigm for Digital Government: Securing Data and Assets within an IT Ecosystem that Extends Beyond Agency Walls

    Sponsored by: Unisys

    This white paper details why federal agencies are transitioning to digital environments, the new security risks these environments present, and how to protect sensitive information from unauthorized access.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: NTT ICT

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • A themed issue looking at the latest trends in print management

    Sponsored by: MicroScope

    A themed issue of the ezine looking at the opportunities for the channel in the managed print world

  • Architecture Overview: SAP HANA with Lenovo System x and NetApp FAS/AFF Systems with NFS

    Sponsored by: SAP/Lenovo/Intel

    This document outlines an integrated SAP HANA architecture, built with tailored data center integration, Lenovo servers, and NetApp data storage systems. Read on to utilize this architecture's data protection for business-critical SAP applications; also illustrated are guidelines for implementation, DR, development, and testing.

  • File Sync and Share with Backup and Recovery Functionality

    Sponsored by: Intermedia

    Explore an enterprise file sync and share strategy with additional backup and recovery features to ensure an extra level of file resilience. See how this cost-effective solution can protect your enterprise data against any data-loss case, including both user error and threats to the environment.

  • Federal Agencies Have a BYOD Program, Like It or Not

    Sponsored by: Lookout

    Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.

  • Secure Content Collaboration Across All Devices

    Sponsored by: Citrix

    This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.

  • For Boundless Data, You Need Limitless Storage: 2016 Storage Updates

    Sponsored by: Red Hat

    See what's new in storage: learn how to scale across physical, virtual, cloud, and hybrid environments with a software-defined platform that limitlessly accommodates today's explosive data influx. Tune into this brief video as experts explain how this data management platform streamlines file and object access, and more.

  • Transform the Economics of Data Storage with Optimal Efficiency

    Sponsored by: IBM

    In this brief data sheet, learn about an enterprise-class hybrid storage solution that transforms the economics of data storage. Read on to see how it complements virtual server environments and its ability to deliver the flexibility and responsiveness your business needs.

  • Six Key Performance and Sizing Considerations When Creating Your Software-Defined Storage Cluster

    Sponsored by: Red Hat

    Designing a software-defined storage (SDS) cluster can be a complicated exercise—and one size certainly does not fit all. This webcast details the six key performance and sizing considerations to keep in mind when you create your SDS cluster.

  • 2016 Cost of Data Breach Study United States

    Sponsored by: IBM

    This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.

  • 2016 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.