ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • The Internet of Relevant Things

    Sponsored by: Aruba Networks

    The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.

  • IoT: How Real-Time Data and Analytics Enable Operational Intelligence

    Sponsored by: Teradata

    This white paper explores how to update your data management and analytics strategies for the increased volumes, security risks, and complexities of IoT. Learn how to improve your organization's decision-making and start planning for you future in IoT with 10 best practice recommendations.

  • 5-Step Data Quality Framework For Data In Motion

    Sponsored by: Infogix

    6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.

  • 4 Mobile Security Insights for CISOs

    Sponsored by: Lookout

    Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.

  • Manage, Monitor & Secure Your IoT Deployment

    Sponsored by: VMware

    The Internet of Things (IoT) is the cause of the next industrial revolution. To take advantage, your IT and OT teams need total control over their IoT use cases. Take 2 minutes to watch this webcast and learn how to manage, monitor, and secure the entirety of your IoT on-premise or in the cloud.

  • The EU General Data Protection Regulation (GDPR): A Pocket Guide

    Sponsored by: DataStax

    Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more.

  • Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

    Sponsored by: Nerdio

    Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.

  • Bracing for Digital Disruption: What the CIO Needs to Know

    Sponsored by: Infor

    This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.

  • Citrix ShareFile eases IT migration to Windows 10®

    Sponsored by: Citrix

    Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.

  • Hybrid Cloud & Data Fabric For Dummies

    Sponsored by: NetApp

    Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.

  • MobileIron and iOS: The Security Backbone for the Modern Enterprise

    Sponsored by: MobileIron

    Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • Infographic: IoT at Enterprise Scale - 6 Best Practices

    Sponsored by: VMware

    The Internet of Things (IoT) is introducing new challenges to traditional operations environments. Access this infographic to prepare for an onslaught of IoT use cases and refocus your strategy to focus on scale, complexity, and security.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • The 5 Features of an Always On Data Platform

    Sponsored by: DataStax

    Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more.

  • Data Center Services: Trust the Professionals

    Sponsored by: Comarch

    Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.

  • How to Plan for IoT Success: Strategy and Recommendations

    Sponsored by: VMware

    The Internet of Things is forcing us to change the way that operations and information technology departments collaborate. Access this white paper to learn how to plan, deploy and manage IoT use cases for tangible, quantifiable benefits.

  • Solving the Big Challenges of Big Data Governance

    Sponsored by: TechTarget

    As your organization strives to become more data driven, you need to think more strategically about governing the data you're looking to be driven by. Access our expert guide, Data Governance Points Way to Better Business, to gain a better understanding on what you need to know when implementing or managing a data governance program.

  • The Developer's Guide to the DevSecOps Galaxy

    Sponsored by: Veracode, Inc.

    Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!

  • Prevent Full-Blown Breaches with Threat Response and Incident Intelligence

    Sponsored by: Proofpoint, Inc.

    The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.

  • Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • 5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy

    Sponsored by: BlackBerry

    In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.

  • Top Mobile Security Threats IT Needs to Know About

    Sponsored by: BlackBerry

    In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.