ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • CW Europe – March 2017

    Sponsored by: ComputerWeekly.com

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Ransomware: Everything You Need to Know

    Sponsored by: Cisco Systems, Inc.

    Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.

  • Data Protection & Privacy: Next Steps and 5 Best Practices

    Sponsored by: HPE and Intel®

    The internet and data privacy laws have been on a collision course for some time now – and it's accelerated by digital transformation sweeping across companies. Inside, explore the challenges that global businesses face when confronting the policy environment, and find 5 best practices to help you meet evolving data privacy and security demands.

  • Digital Remote Monitoring and How it Changes Data Center Operations and Maintenance

    Sponsored by: APC by Schneider Electric

    A lot happens in 10 years, and data center remote monitoring services have come a long way. Access this white paper to learn about digital remote monitoring services, how they support your data center and mobile technologies, and why it's time to replace any lingering offline monitoring.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Secure Information Exchange in the Digital Age

    Sponsored by: OpenText

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Disaster Recovery Guide: DR in Virtualized Environments

    Sponsored by: Macquarie Cloud Services

    Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.

  • Seeking secure Wi-Fi

    Sponsored by: MicroScope

    An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending

  • 6 Questions Answered About Safe Harbor Getting Struck Down

    Sponsored by: Symantec & Blue Coat Systems

    This infographic quickly answers 6 common questions asked about the repercussions of Safe Harbor being struck down including the origins of the ruling, who the ruling applies to, how to comply with cloud systems, and more.

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • Building Trust in a Cloudy Sky

    Sponsored by: McAfee, Inc.

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • Top 10 Reasons Quorum Beats the Competition

    Sponsored by: QuorumLabs Inc.

    Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.

  • Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah

    Sponsored by: QuorumLabs Inc.

    Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Customer Success Stories: Unified Endpoint Management

    Sponsored by: vmware airwatch

    End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.

  • The Massive Mobile Migration

    Sponsored by: IBM

    The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.

  • UBM Dark Reading & VMware AirWatch® Webinar

    Sponsored by: vmware airwatch

    In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • How to Plan Your Hybrid Cloud Backup Strategy

    Sponsored by: Colospace Inc.

    Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.

  • Cloud Security and Content Management: Box Case Study

    Sponsored by: IBM

    Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.

  • Box: Securing Business Information in the Cloud

    Sponsored by: IBM

    Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.

  • ECM and Collaboration: Transforming Work in the Cloud

    Sponsored by: IBM

    This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.