ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Case Study: The open University Protects Research Initiative with UDP

    Sponsored by: arcserve

    Witness how The Open University, a university in the UK, implemented a Unified Data Protection (UDP) solution that enabled them to efficiently back up and recover data over a SAN environment. Explore how you can ensure secure, continuous access to your data with this solution.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.

  • The Cost of Unintentional Insider Threat

    Sponsored by: Forcepoint

    A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Case Study: NCG Safeguards Learning Experience for Students with UDP

    Sponsored by: arcserve

    NCG, an education organization, decided to implement a Unified Data Protection (UDP) solution with robust deduplication and compression features to solve their data management struggles. Discover how a UDP solution can safeguard your data and enable your enterprise to save significantly in terms of storage space, staff time, and licensing fees.

  • Case Study: Konvert Reduces Business Risk and Simplifies IT Management withUDP

    Sponsored by: arcserve

    Witness how Konvert, an employment agency, replaced their existing, unstable backup with a Unified Data Protection (UDP) solution for better backup management across all of their offices. Explore how this solution enabled Konvert to minimize data storage requirements, simplify backup management, speed up data recovery, and more.

  • Customer Use Cases: Implementing Unified Data Protection Solutions

    Sponsored by: arcserve

    In this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.

  • VM Data Protection for Dummies

    Sponsored by: Veeam and Quantum

    Discover innovative, modern data protection solutions for data in virtualized environments and explore best practices for choosing the VM protection solution that's right for your enterprise. With the right solution, your enterprise can cost-efficiently secure your virtual environments and backup your data.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Case Study: Hunters Safeguards 150TB of Architectural Data with Arcserve UDP

    Sponsored by: arcserve

    In this case study, witness how Hunters, a consultancy firm, implemented a Unified Data Protection (UDP) solution that automatically generated backup reports and minimized their storage requirements and costs with integrated deduplication capabilities.

  • QRadar: Expert SIEM Product Overview

    Sponsored by: IBM

    Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.

  • Top 10 Reasons to choose EMC Data Protection Solutions

    Sponsored by: Richardson Eyres

    Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.

  • The Axway MFT Solution Transcript

    Sponsored by: Axway

    It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.

  • Secure File Transfer Lifecycle

    Sponsored by: Axway

    This presentation transcript highlights how two globally recognized companies maintain brand equity and commerce by securing, scaling and optimizing their data and file exchange capabilities. Discover how to maximize the transfer, communication and security of information between your headquarters and your global community.

  • MFT as a Shared Service- Transcript

    Sponsored by: Axway

    Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.

  • Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • eCommerce Payments 101: Set up a Solid Payment Foundation

    Sponsored by: CyberSource

    This tutorial explains how to streamline the efficiency of payment security from a variety of channels and currencies as your organization scales. Discover how to automate payment operations while simplifying fraud management and payment security.

  • Data Refinement: Facilitating the data-driven organization

    Sponsored by: IBM

    Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.

  • Robust Payment Security Builds Customer Confidence in your Brand

    Sponsored by: CyberSource

    Letting people pay their preferred way, both smoothly and securely, builds customer satisfaction and loyalty. Discover ways to secure payment data in a step-by-step diagram.

  • Object Storage Erasure Coding and Self Protecting Technologies

    Sponsored by: HGST

    Scale-out object storage solution can provide disk-based access performance with high levels of durability, scalability, and simplicity. Discover how this storage system can enable your enterprise to simplify your storage architecture and take advantage of your data without requiring your budgets to significantly increase.

  • Object Storage Architecture Removes File Crawl Issues

    Sponsored by: Cloudian

    In this expert guide, find out the many differences of object storage that make it that much more efficient and economical fit for your enterprise, such as active or cold archiving, search, analytics, and more.

  • CERN deploys IBM data protection software to safeguard petabytes of critical data

    Sponsored by: IBM

    The IT department at CERN, known for the Large Hadron Collider, manages a massive data archive of 100 petabytes of data. Read on to learn about the data storage and backup functionality that meets CERN's big-data protection requirements.

  • Top 8 Trends For Big Data

    Sponsored by: Tableau Software

    Big data is experiencing a boom in importance and usage. More businesses are coming to rely on data for critical decisions. Why not make your data work for you? You already own it, so make the most of it. Read on to discover the top eight trends currently underway in big data and how to make them work for you.

  • Success Story Video: State of California

    Sponsored by: Axway

    Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.