ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

  • Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security

    Sponsored by: Absolute

    Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.

  • Top 6 Security Considerations in Migrating to Microsoft Windows 10

    Sponsored by: Absolute

    Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.

  • Mitigating the Impact of Critical IT Events

    Sponsored by: Splunk Services UK Ltd

    In this Quocirca research report, discover how to create effective operational intelligence within your organization to improve coordination between security team members and deal with critical IT events (CIEs) faster.

  • Gaining Support for ITAM: Improve IT Operations Through Data Curation

    Sponsored by: BDNA

    Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.

  • Swisslos Increases Uptime, Improves Customer Experience and Security

    Sponsored by: Splunk Services UK Ltd

    This case study explores how the international lottery company Swisslos found a scalable analysis program that could replace their outdated legacy system. Go inside to learn how they were able to respond quickly to security threats, significantly diminished overhead costs, cut-down on IT maintenance time, and more.

  • Infographic: Application-Layer Breaches Persist

    Sponsored by: Veracode, Inc.

    See four major examples of application-layer data breaches and the damage they caused. Discover how and why they happened so you can better secure your application software for the future.

  • Trends and Tactics: How IT Professionals are Approaching AppSec Today

    Sponsored by: Veracode, Inc.

    Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.

  • Why the Cloud Should Be Part of Your Data Protection Strategy

    Sponsored by: Microsoft

    This white paper explores the role that the cloud plays in strong data protection strategies for agile IT organizations. Access now to learn more about a hybrid approach to data management and cloud-connected backups.

  • Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes

    Sponsored by: UXC Oxygen and Amazon Web Services

    More enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.

  • How the Cloud Has Changed Email Archiving Forever

    Sponsored by: Mimecast

    To solve mailbox bloat, CIOs are turing to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.

  • Why Email Security Matters: The Advantages of Hosted Protection

    Sponsored by: LogicNow

    Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.

  • Data Protection in Two Dimensions

    Sponsored by: EOH IBM

    Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.

  • 5 Essentials for Achieving Cloud Archiving Success

    Sponsored by: Mimecast

    Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.

  • Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget

    Sponsored by: IBM

    Learn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.

  • The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment

    Sponsored by: Armor

    This infographic shows you an hour by hour breakdown of a threat actor through the typical "secure" environment so you can better understand how they carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.

  • The Evolution of Locky Ransomware's Javascript Downloaders

    Sponsored by: Booz Allen Hamilton

    Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.

  • Plan for Disaster Recovery Based on Specific Threat Considerations

    Sponsored by: LogicNow

    Benjamin Franklin's adage 'an ounce of prevention is worth a pound of cure' holds true for disaster recovery scenarios. Being proactive is better than being reactive. Download this e-book to access 5 key questions to ask yourself when planning and future-proofing your disaster recovery strategies.

  • Enterprise Security Gets Adaptive

    Sponsored by: Kaspersky Lab

    This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).

  • How to Choose the Right Disaster Recovery Solution

    Sponsored by: LogicNow

    In this e-book, you will learn how to formulate tactical backup and recovery by considering the possible disasters, matching them with the data sets to be protected, and identifying key recovery objectives. Read on to build a DR solution requirements list that specifically matches your organization's needs.

  • Four Top Cybercrime Trends

    Sponsored by: IBM

    Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.

  • Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities

    Sponsored by: IBM

    Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.