ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: SearchSecurity.com

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Array Networks Secure Remote Access Case Study: City of Santa Barbara

    Sponsored by: Array Networks

    The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.

  • Fourth Generation Data Leak Prevention

    Sponsored by: Ghangor Cloud

    In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.

  • Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation

    Sponsored by: MobileIron

    This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.

  • Jargon buster guide to GDPR

    Sponsored by: ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Data Governance: Embracing Security and Privacy

    Sponsored by: Tealium

    With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.

  • The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds

    Sponsored by: Nutanix

    Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.

  • The Definitive Guide to Hyperconverged Infrastructure

    Sponsored by: Nutanix

    Hyperconverged infrastructure has emerged to become the building block of your enterprise cloud. Access this comprehensive guide to learn everything you need to know to get started in your search for a hyperconverged infrastructure platform.

  • 5 Steps To Defining Your Data Retention Policies

    Sponsored by: Iron Mountain

    Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

  • Infographic: A New Dawn for Data Privacy

    Sponsored by: Symantec & Blue Coat Systems

    EU General Data Protection Regulation (GDPR) will be implemented in 2018, introducing a new era in data security. In this infographic, learn what you need to know about GDPR and how it will affect your enterprise.

  • Digital Innovations and Changing Demographics are Redefining Government by the People, for the People

    Sponsored by: HPE and Intel®

    Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.

  • CW Europe – March 2017

    Sponsored by: ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Ransomware: Everything You Need to Know

    Sponsored by: Cisco Systems, Inc.

    Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

  • The Essential Guide to Storage for DevOps

    Sponsored by: Tintri

    When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.

  • The Essential Guide Data Protection and Disaster Recovery

    Sponsored by: Tintri

    Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.

  • EMM Real Benefits in Today's Mobile World

    Sponsored by: vmware airwatch

    The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.

  • Five Key Indicators that You Need to Adopt EMM Now

    Sponsored by: vmware airwatch

    How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.

  • Customer Success Stories: Unified Endpoint Management

    Sponsored by: vmware airwatch

    End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.

  • The Massive Mobile Migration

    Sponsored by: IBM

    The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.

  • UBM Dark Reading & VMware AirWatch® Webinar

    Sponsored by: vmware airwatch

    In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.