ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • The Evolution of Enterprise File Sync and Share

    Sponsored by: ibm box

    Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.

  • Secure Your Connected Medical Devices

    Sponsored by: Zingbox

    Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.

  • Expert Report for Enterprise File Synchronization and Sharing

    Sponsored by: ibm box

    70% of today's EFSS destination vendors will cease to exist, be acquired or be put out of business by 2018. Access this expert report to learn how EFSS vendors need to evolve in order to survive. Find out which vendor best meets your business' EFSS needs and which ones will last.

  • 3 File Transfer Mistakes that Could Be Costing You and Putting Data at Risk

    Sponsored by: Globalscape

    IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.

  • Best Practices for Ransomware Detection and Remediation

    Sponsored by: Arctic Wolf Networks, Inc.

    Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Access this expert resource to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Remote and Branch Offices: Leveraging Modern Storage and Data Centers

    Sponsored by: Veeam Software

    This white paper explores how remote and branch offices (ROBOs) can build the modern data center, a highly virtualized environment that leverages up-to-date storage and has a cloud strategy in place. Uncover useful tips and options for setting up critical systems like backup, recovery, replication, and more.

  • Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond

    Sponsored by: Trustwave

    Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.

  • Operations Management with Veeam and VMware vSphere

    Sponsored by: Veeam Software

    Discover a virtualization platform designed to remediate system issues, optimize infrastructure capacity, and maintain the availability requirements of today's always-on enterprises. Read on to also utilize fast and flexible recovery of virtualized apps and data, uniting VM backup and replication.

  • How to Save Storage Space with Purposeful Backups

    Sponsored by: Veeam Software

    Discover how to effectively reduce storage capacity when performing backups by combining the strategies outlined here for flexible and powerful data protection. Based on your needs, learn when you should prioritize SLA over storage (and vice versa), best practices when backing up to tape, and more.

  • 5 Ways to Achieve Big Data Protection

    Sponsored by: Commvault

    Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Data Analytics Used to Combat the Opioid Epidemic

    Sponsored by: SAS

    Find out how the utilization of predictive analytics contributes to the development of better treatment protocols for the opioid epidemic. Learn how to take action with the comprehensive data management approaches outlined, such as automating data assembly and streamlining report generation.

  • How Analytics Help to Fight Tax Fraud

    Sponsored by: SAS

    In this resource Deborah Pianko, a Government Fraud Solutions Architect speaks about how predictive analytics may offer the opportunity to stop tax fraud before it takes place. Learn about predictive modeling, how to incorporate predictive analytics into existing BI programs, 3 things agencies must know about fraud detection, and more.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Is Artificial Intelligence on the March to Replace Traditional IT Administrators?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.