ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • EMC ScaleIO: Software-defined, Scale-out SAN

    Sponsored by: EMC

    Growing infrastructures are a major challenge for data center operation teams. Access this data sheet to learn about a solution to keep your infrastructure from being what holds your business back.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Securing the Internet of Things: 6 Crucial Steps

    Sponsored by: Hewlett-Packard Enterprise

    Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.

  • Software-Defined Scale-Out NAS: Simple and Efficient Storage for Enterprise Edge Locations

    Sponsored by: EMC

    This white paper discusses a software-defined storage solution with scale-out NAS that extends the data lake to enterprise edge locations. Read on to learn how this solution can reduce your costs and simplify management by consolidating your unstructured data, eliminating inefficient storage silos, and streamlining data protection.

  • Traditional Backup Vs. Modern Data Protection

    Sponsored by: Commvault

    From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.

  • Analyst Perspective: How Smart Businesses Use the Cloud

    Sponsored by: Commvault

    In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.

  • Cybersecurity for the Digital Age: The Essential Guide

    Sponsored by: Dimension Data

    In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.

  • Deploying an EFSS Solution: Six Steps for Success

    Sponsored by: BlackBerry

    This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.

  • Why Enterprises Need Trustworthy Data

    Sponsored by: IBM

    In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.

  • Developing Data Integration and Lifecycle Management Strategy for a Hybrid Environment

    Sponsored by: IBM

    Examine the four pillars for successful information governance in hybrid environments and how to implement a successful integration and lifecycle strategy. Access now to see how you can improve the reliability, flexibility, and scalability of your data integration, management, security, and analytics solutions.

  • HEIDELBERG Simplifies Backups and Restores Flexibility

    Sponsored by: Hewlett Packard Enterprise

    Access this case study to learn how one printing press manufacturer combined hardware and software to better align its IT and business goals with its backup needs.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.

  • Backup Solution Vendors: Reviews from the Tech Community

    Sponsored by: Hewlett Packard Enterprise

    With enterprise technology, you can't simply rely on the word of vendors. Access this list of user reviews to hear what your peers objectively think about various data backup and protection solutions.

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Visual Analytics: Easily Explore Data to Make Decisions You Can Trust

    Sponsored by: TIBCO Software Inc.

    Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.

  • Experts Discuss the Benefits of Unified Virtual Server Data Protection

    Sponsored by: Commvault

    In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.

  • Consider Security in your Daily Business Operations

    Sponsored by: IntraLinks, Inc

    This e-guide teaches you the importance of collaboration on a micro level for defending your organization against cyber threats. Learn how to embed security practices in your daily business practices and embrace a flexible mindset as your business needs change.

  • Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software

    Sponsored by: Pure Storage

    This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.

  • A Mobile Device Management Platform for the Modern Enterprise

    Sponsored by: IBM MaaS360

    Discover in this data sheet how to leverage an easy-to-use cloud platform to enforce end-to-end management of all mobile devices in your enterprise. Seamlessly integrate this cloud-based mobility management with your infrastructure and equip yourself with its MDM essentials.

  • Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service

    Sponsored by: Cloudian

    This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.

  • The Changing Landscape of Data Usage

    Sponsored by: Commvault

    In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.

  • Managed file transfer: Minimizing risk and strengthening compliance in data exchange

    Sponsored by: IBM

    This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.

  • Network security stack: How and why to consider adding new layers

    Sponsored by: OpenDNS

    This e-book teaches you about new tools to fully protect your employees wherever they go. Discover a cloud-delivered security that shores up your defenses and gets in front of attacks even as they increase in sophistication.

  • Three Considerations for Modernizing Data Protection

    Sponsored by: Hewlett Packard Enterprise

    In this report, you'll learn why backup is the cornerstone of a data protection strategy. Access now to uncover what you can do to ensure top security initiatives are met with solid data protection and backup policies, along with other top IT concerns.

  • Case Study: API Gateway Secures Public APIs and Minimizes Costs

    Sponsored by: Axway

    APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.