ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Hybrid Cloud & Data Fabric For Dummies

    Sponsored by: NetApp

    Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • MobileIron and iOS: The Security Backbone for the Modern Enterprise

    Sponsored by: MobileIron

    Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • Data Center Services: Trust the Professionals

    Sponsored by: Comarch

    Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.

  • Solving the Big Challenges of Big Data Governance

    Sponsored by: TechTarget

    As your organization strives to become more data driven, you need to think more strategically about governing the data you're looking to be driven by. Access our expert guide, Data Governance Points Way to Better Business, to gain a better understanding on what you need to know when implementing or managing a data governance program.

  • The Developer's Guide to the DevSecOps Galaxy

    Sponsored by: Veracode, Inc.

    Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!

  • Prevent Full-Blown Breaches with Threat Response and Incident Intelligence

    Sponsored by: Proofpoint, Inc.

    The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.

  • Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It

    Sponsored by: Proofpoint, Inc.

    This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

  • Beware the Beastly Threats of IT security

    Sponsored by: Lenovo

    It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.

  • Unified Data Protection Vendor Comparison

    Sponsored by: Veritas

    The digital transformation of business requires enterprise data management that delivers protection, availability and insights. See how Veritas and NetBackup provide the easy foundation for enterprise data management. Download this document to learn how Veritas compares to other vendors in the field.

  • Vendor Comparison Based on Top 8 Data Protection Needs

    Sponsored by: Veritas

    NetBackup unified data protection protects all data no matter where it lives: virtual, physical or in the cloud. See how NetBackup provides scale, performance and extensive workload integration from a single console.Download this document to learn how Veritas compares to other vendors in the field.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • What to Consider Before Buying Database Performance Monitoring Tools

    Sponsored by: SearchDataManagement

    To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.

  • How Transactional Analytics is Enabling Digital Payments Transformation

    Sponsored by: Aerospike

    Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Don't Rush into Cloud Databases without a Well-Grounded Plan

    Sponsored by: Data Intensity

    In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.

  • Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

    Sponsored by: Dell EMC and Intel®

    This white paper highlights must-have data security features deduplication should encompass. Access this resource from Dell EMC now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: SearchSecurity.com

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • 5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy

    Sponsored by: BlackBerry

    In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.

  • Top Mobile Security Threats IT Needs to Know About

    Sponsored by: BlackBerry

    In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • SaaS Analytics: Safe and Certain Reporting

    Sponsored by: IBM

    In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.