ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Governing the Complications of Social Media Security and Compliance

    Sponsored by: Actiance

    In this exclusive e-guide, technology law expert Jeffrey Ritter discusses the obstacles of governing social media security in 21st century business and what you can do to protect sensitive company information.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Benefits of Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.

  • Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    In today's connected world, all of your company's data needs to be managed, visualized and integrated into business processes to secure the future of your digital ecosystem. Learn how to best protect the giant influx of complex data flow and monitor this data end-to-end as it flies through your ecosystem.

  • E-Waste Is More Than Just Clutter – It’s A Security Issue

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    This webinar discusses the August 2015 McAfee Labs Threat Report. Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Tune in to discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

  • IT Guide: Windows 10 Migration Minus The Complexity

    Sponsored by: Druva Software

    With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.

  • Mining for Insight: Rediscovering the Data Archive

    Sponsored by: Iron Mountain

    Uncover study results that highlight the struggles enterprises have with archiving their data. Discover how to implement a consistent approach to data archiving so that you can leverage your data and improve your customer service and revenue streams.

  • Understanding How IBM Spectrum Protect Enables Hybrid Data Protection

    Sponsored by: IBM

    Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.

  • Definitive Guide: Securing The Mobile Enterprise

    Sponsored by: Aruba Networks

    Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.

  • FAQ: ShareFile Cloud for Healthcare

    Sponsored by: Citrix

    Answer your frequently asked questions regarding ShareFile Cloud, an enterprise file sync and sharing (EFSS) solution, and see its benefits for healthcare organizations. Access now to witness how your organization can manage patient files and meet HIPAA requirements with an EFSS service.

  • The Need for Third Party Archiving

    Sponsored by: Commvault

    Third-party email archiving solutions can address customer needs that basic archiving solutions, such as Microsoft's Office 365, can't achieve. Discover the benefits your enterprise can achieve with a third-party archiving solution, such as storage flexibility, advanced search capabilities, full audit of the archive and more.

  • SOC Blog

    Sponsored by: Citrix

    This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.

  • Where Network Virtualization Fits Into Data Center Initiatives

    Sponsored by: VMware

    Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.

  • What You Want To Know (But Haven’t Asked) About Micro-Segmentation

    Sponsored by: VMware

    Perimeter security is no longer enough to meet data center security requirements. Micro-segmentation is an important security aspect that you need to fully understand. Explore this technical brief to learn about facets of micro-segmentation that many resources don't cover.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • The Zero Trust data center in action

    Sponsored by: VMware

    Micro-segmentation is the key to securing your data center from the inside out. Read on to learn more about how micro-segmentation works, how to incorporate it, the role network virtualization plays and the benefits it brings.

  • Assessing the Opportunities Presented by the Modern Enterprise Archive

    Sponsored by: Druva Software

    There are 4 key areas in which enterprise archive solutions have evolved; cloud and remote user continuity, full-text and metadata indexing and search, automated data compliance awareness, and data policy management. Discover business benefits your enterprise can achieve with a modern archive solution.

  • How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements

    Sponsored by: Citrix

    To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.

  • Practical Guide to IT Security Breach Prevention Part II

    Sponsored by: Kaspersky Lab

    With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.

  • Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.

  • Why Move Backup and Disaster Recovery To The Cloud

    Sponsored by: Druva Software

    Discover 20 real-world business reasons to move backup, archival, and disaster recovery (DR) to a unified cloud platform. See how public cloud can provide your enterprise with the reliability, security, and scalability you need to protect your disparate workloads.

  • Security and availability in extremely adverse environments

    Sponsored by: Barracuda Networks

    Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.