Research Library

Powered by

Data Security Research

  • Mac OS X Security Checklist

    Sponsored by: JAMF Software

    This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.

  • Discovering the New Business Case for Cybersecurity

    Sponsored by: Symantec Corporation

    This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.

  • Intellectual Property: Safeguarding Your Organization's Identity

    Sponsored by: TITUS

    This infographic has some fast facts about the rate and the risks of IP theft. Take a look to learn how much danger your IP is in – and how you can better keep it safe.

  • Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats

    Sponsored by: IBM

    This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.

  • HGST Active Archive System

    Sponsored by: HGST

    This white paper how an active archival system can make storage more efficient and simplify storage management. Read on to learn how you can lower your storage total cost of ownership, easily scale capacity and performance, increase resiliency, and more.

  • Information Security ANZ Nov 2015

    Sponsored by: TechTarget ANZ

    In this issue we look at the true cost of a data breach to an Australian organisation.

  • Information Security Asean November 2015

    Sponsored by: TechTarget ANZ

    The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it

  • Cloud Data Encryption Made Easy

    Sponsored by: Oracle Corporation

    This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.

  • Case Study: Major Financial Institution Defends against High Volume SQL Injection

    Sponsored by: Akamai

    Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.

  • Apple Native Security

    Sponsored by: JAMF Software

    Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.

  • Data Archiving for Financial Services

    Sponsored by: Proofpoint, Inc.

    Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.

  • Secure Cloud Infrastructure: Is Private Cloud Data Safe?

    Sponsored by: Oracle Corporation

    Explore what security measures are required from a private cloud provider in this white paper. In addition, read on to examine one private cloud platform that can help your organization to meet these security and compliance requirements.

  • 2015 Cost of Data Breach Study: India

    Sponsored by: IBM

    Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.

  • 2015 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    This exclusive report quantifies the economic impact of data breaches in 2015 by observing cost trends over time and analyzes the impact of business continuity management programs. Access now to see how implementing a business continuity management program can positively impact the financial and reputational consequences of a data breach.

  • Simplifying the Management of Macs and Mobile Devices

    Sponsored by: Centrify Corporation

    Consumerization gives employees a choice, and they're choosing personal products, such as Mac laptops and iOS and Android phones. However, this opens up a world of security risks. Download this white paper to learn about managing and securing Macs and other mobile devices.

  • Forbes Insight Paper: How Cloud is Changing the Face of Resiliency

    Sponsored by: IBM

    This white paper discusses how cloud storage can be extremely successful in ensuring resilience and efficient backup but there is no "one-cloud-fits-all" strategy. Read on to see how implementing the right cloud solution can help improve your enterprise's business continuity management and ensure stronger data protection.

  • Supporting Technologies and Enterprise Scenarios for Deploying DLP Products

    Sponsored by: Oracle Corporation

    In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.

  • Introduction to the Top Database Security Tools

    Sponsored by: Oracle Corporation

    This expert guide provides detailed information on the most important database security tools and top vendors that you should know about.

  • A Closer Look at Database Security and Steps For Purchasing

    Sponsored by: Oracle Corporation

    This expert guide discusses how you can improve your security by including database protection in your defenses.

  • Reduce Attack Surface and Compliance Risks with Unified Threat Protection

    Sponsored by: Proofpoint, Inc.

    In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.

  • Lab Validation Report: Cloud NAS for the Distributed Enterprise

    Sponsored by: Nasuni Corporation

    This exclusive report tests a cloud NAS system and assesses its file data access and control, unlimited scalability, and built-in data protection and security. Read on to discover how NAS can synchronize your data files across multiple locations and streamline the infrastructure required to manage your enterprise's unstructured data at scale.

  • Best Practices for Adding Macs to Microsoft Networks

    Sponsored by: Centrify Corporation

    This paper will help answer those questions and explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.

  • CXO Guide to Security and Archiving Challenges with Office 365

    Sponsored by: Proofpoint, Inc.

    Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.

  • 20 Critical Controls for Effective Cyber Defense

    Sponsored by: LogRhythm, Inc.

    This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.

  • Don't Believe the Hype - All Containers are Not Equal

    Sponsored by: Good Technology

    This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.