Research Library

Powered by

Data Security Research

  • Protecting Data After the Digital Disruption

    Sponsored by: Proofpoint, Inc.

    Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.

  • Empowering IT with Distributed Capture Scanner Technology

    Sponsored by: Kodak Alaris

    Take the next step on your digital transformation journey and discover how distributed capture technology can help IT departments ensure a fast, secure flow of data through the enterprise, improve user experiences, manage unstructured data volumes, and accelerate document management.

  • Best Practices of Third-Party Software Security

    Sponsored by: Veracode, Inc.

    This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.

  • From the Top: What Executives Need to Know About Cybersecurity

    Sponsored by: Kaspersky Lab

    $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.

  • Top 3 Ways HyperScale for OpenStack Protects your Applications and Data

    Sponsored by: Veritas

    Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.

  • Governance and Compliance in 2017: A Real World View

    Sponsored by: Box

    Read AIIM's report to learn about today's information governance challenges and steps your organization can take to tackle them.

  • Leveraging a Revolutionary Software-Defined Storage Architecture for OpenStack-Based Clouds

    Sponsored by: Veritas

    Enterprises are adopting private clouds to meet business demands, address competitive pressures and realize benefits such as cost-effectiveness and agility. Veritas HyperScale for OpenStack employs a new architecture that uses direct attached storage and divides the storage functionality across two separate planes. Read on to learn more.

  • IT Security: Cost Center or Strategic Investment?

    Sponsored by: Kaspersky Lab

    Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.

  • The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within

    Sponsored by: Kaspersky Lab

    52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.

  • Steps to Protect Your Growing Data

    Sponsored by:

    The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.

  • Enterprise Mobility Trends to Watch in 2017: Q&A with Sumit Dhawan

    Sponsored by: VMware

    Download this Q&A to find out how companies can turn problematic realities such as shadow IT and BYO trends, into real business value.  And, discover additional insights into key enterprise mobility trends to watch—and how to take action.

  • Lightning Speed: Getting to the Cloud Faster

    Sponsored by: Commvault

    You need to get your organization into the cloud before your employees start doing it on their own, creating a shadow IT nightmare. Access this white paper to learn how to get to the cloud faster than your employees can put your organization at risk.

  • Cloud Data Management: Enabling Hybrid IT Infrastructure

    Sponsored by: Commvault

    Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.

  • 11 Things Every Organization Needs to Know When Migrating Oracle Apps to the Cloud

    Sponsored by: Cintra

    While Oracle's cloud is engineered to work with your Oracle apps and databases, it isn't simply a case of shifting exactly what you've got on-premise to the cloud. Discover 11 things you need to consider as you plan your Oracle cloud migration.

  • Gemalto Wades Deeper into IDaaS Waters with Adaptive Access Controls for Cloud Resources

    Sponsored by: Gemalto

    Authentication and access controls typically present a tradeoff between security and convenience. This white paper keys into how Gemalto SafeNet offers 3 core functions each time a user attempts to access on-premises or cloud resources.

  • 6 Things That Will Accelerate Enterprise Mobility Security Adoption

    Sponsored by: SyncDog

    According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.

  • Firewall Best Practices to Block Ransomware

    Sponsored by: Sophos, Inc.

    Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.

  • Synchronized Security: Best-of-breed defense that's more coordinated than attacks

    Sponsored by: Sophos, Inc.

    Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.

  • GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance

    Sponsored by: SyncDog

    Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.

  • SyncDog Metropolitan Police Department Case Study

    Sponsored by: SyncDog

    In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.

  • Slow & Steady Will Not Win The Cybersecurity Race

    Sponsored by: CloudPassage

    Only 50% of respondents believe that security is capable of moving as fast as new release cycles, according to professionals interviewed at the RSA USA conference. Take a closer look at this infographic to uncover statistics about what IT professionals think about security technologies today.

  • Don't Let Legacy Security Tools Hold Up PCI Compliance in the Cloud

    Sponsored by: CloudPassage

    Explore the top challenges of using traditional PCI security controls in a cloud environment. Learn how you can automate cloud compliance with the Payment Card Industry Data Security Standard.

  • A New Approach for Securing DevOps Environments in the Cloud

    Sponsored by: CloudPassage

    Don't let the rapid pace of today's technology environment hinder your security posture. Explore this white paper and reveal how to keep up with ever changing technologies and secure your DevOps environments in the cloud.

  • A Primer on File-Borne Malware Threats

    Sponsored by: OPSWAT inc

    Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.