Research Library

Powered by

Data Security Research

  • Better Together: Security and Collaboration with Backup and Box

    Sponsored by: Code42

    This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.

  • TAG Cyber Report: 2017 Security Annual – Vol. 1

    Sponsored by: Digital Guardian

    This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.

  • Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

    Sponsored by: Ambra

    Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.

  • Companies, Digital Transformation and Information Privacy: The Next Steps

    Sponsored by: Hewlett Packard Enterprise

    The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.

  • Securing Office 365 Is Easier Than You Think

    Sponsored by: Palo Alto Networks

    SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.

  • Case Study: Jefferson Radiology Implements Cloud VNA

    Sponsored by: Ambra

    See how Jefferson Radiology revolutionized imaging workflows by replacing their legacy image exchange vendor and migrating to a new cloud-enabled PACS. Learn about best-in-class image management that will automate workflows and provide seamless cloud access to records.

  • Avoid the Five Classic Fails of Enterprise Backup

    Sponsored by: Code42

    Outdated backup technologies and patchwork add unnecessary burdens for IT and end users, increase costs, and leave the business vulnerable to disastrous data breach and data loss. This white paper highlights the five classic fails of enterprise backup, so you can avoid these common missteps.

  • Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management

    Sponsored by: CA Technologies

    This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT.

  • Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud

    Sponsored by: Intel Security

    As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.

  • The General Data Protection Regulation Challenge

    Sponsored by: Close Brothers Technology Services

    This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.

  • IoT: Internet of Things -- or Internet of Threats?

    Sponsored by: Radware

    This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Case Study: Disc Comfort Fuses Image Management and the Cloud

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.

  • CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS

    Sponsored by: Ambra

    Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.

  • The New World of Unified Image Management

    Sponsored by: Ambra

    In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • SLA-Driven Data Protection Modernization: An ESG Video Interview

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • Secure Locations for Your IT Platforms

    Sponsored by: BT

    It is critical to maintain the balance between critical business data upkeep and facility security to host your IT systems. Learn about the cloud's role in making your network secure, sufficient, and sustainable while maintaining that necessary balance.

  • Computer Weekly – 20 September 2016: Digital giving – transforming Save the Children with technology

    Sponsored by:

    In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by:

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Preventing Ransomware Threats to Health Data in 10 Steps

    Sponsored by: OpenDNS

    Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.

  • 7 Critical Components for Cybersecurity Readiness

    Sponsored by: Dimension Data

    This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.

  • How Strong Is Your Electronic Healthcare Records Storage Strategy?

    Sponsored by: Kaminario

    In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.