ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • 5 Ways to Extend Security Beyond Dropbox

    Sponsored by: Vera

    Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.

  • Virtualized Data Risks: How to Assess, Protect and Recover From Data Loss

    Sponsored by: Acronis

    This white paper details seven virtualization backup/data protection "must-haves". Download now to find out how you can keep your data safe in virtualized environments.

  • Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection

    Sponsored by: Acronis

    Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.

  • How to Stop Cyber Attacks Using Adaptive Authentication

    Sponsored by: SecureAuth

    This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.

  • What to Expect in 2016: Top 5 Predictions for Security and Access Control

    Sponsored by: SecureAuth

    This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.

  • Customer Stories: "No Limits" Data Protection

    Sponsored by: Hewlett Packard Enterprise

    In this brief webcast, hear from real customers – your peers – as they discuss HPE's data protection solution and its benefits. Watch now to see how you can increase the scalability, efficiency, and affordability of your data protection strategy.

  • Computer Weekly – 26 January 2016: Beyond India – the emerging outsourcing destinations

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the growing number of offshore alternatives to the dominant outsourcing destination of India. We examine how to respond if your organisation is affected by a data breach. And we analyse how virtualisation technology can help improve your disaster recovery strategy. Read the issue now.

  • Forward Thinking Backup: Data Protection for the Digital Business

    Sponsored by: Veritas

    This white paper discusses the challenges of protecting data in today's digital world and highlights a converged backup and recovery platform with scalable storage appliances that enable cost savings and simplified management. Access now to see the benefits this platform can provide, including instant data recovery, cloud integration, and more.

  • Top 5 Pitfalls to Avoid in Your Data Protection Strategy

    Sponsored by: Veritas

    This white paper uncovers five common, critical pitfalls to avoid when building a data protection strategy. Read on to learn how to navigate through these pitfalls so that your enterprise can implement a data protection solution that eliminates complexity, reduces staff inefficiencies, enables faster decisions, and accelerates your ROI.

  • New Rules of Data Security Virtual Portal

    Sponsored by: IBM

    This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: Veritas

    This resourceful white paper offers 8 tips to maximize the value of your data protection investment and stay on top of the 2016 data protection trends. Read on to learn how your enterprise can accelerate your digital transformation, reduce cost and complexity, get ahead of exponential data growth, and more.

  • 8 Noble Truths of Backup and Recovery

    Sponsored by: Acronis

    This white paper provides eight guidelines for successful backup and recovery. Access now and learn how to effectively protect your data and prevent data loss after a potential disaster.

  • The Data Protection Playbook For All-Flash Storage

    Sponsored by: Hewlett Packard Enterprise

    In this white paper, you will discover four key factors to consider when optimizing efficiency and reducing the cost of data backup in your flash environment. Read on to utilize flash-integrated flat backup, learn how to combine snapshots and backups for best-practice data protection, and more.

  • Backup for Dummies

    Sponsored by: Acronis

    This e-book provides a comprehensive guide for putting data protection and disaster recovery systems in place for use cases ranging from simple file recovery to the most complex systems. Read on to learn how to manage your enterprise's data with ten tips for easier backup and recovery.

  • Update your current Apple and Oracle software now

    Sponsored by: WatchGuard Technologies, Inc.

    Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.

  • Simplifying Server Workload Migrations With Effective Disaster Recovery

    Sponsored by: Acronis

    This white paper describes the challenges faced when migrating production systems to dissimilar hardware or another hypervisor platform. Read on to see how a backup technology can address these challenges and allow your enterprise to migrate production workloads to and from any platform, support disaster recovery and system replication, and more.

  • ROI of IT Disaster Recovery

    Sponsored by: Acronis

    This white paper discusses the importance of a disaster recovery (DR) solution using an ROI analysis as an argument for the investment. Read on to learn how your enterprise can choose a DR and business continuity strategy that will match your needs and how to calculate ROI for your DR solutions.

  • Evaluating Cloud Security Solution for Amazon Web Services

    Sponsored by: Palerra Inc.

    This buyer's guide outlines various requirements you must consider when purchasing an AWS security solution.

  • The Threat Landscape of 2015

    Sponsored by: Forcepoint

    This report examines new technological trends and discusses what these trends mean for your security.

  • How to Vet and Deliver Better Mobile App Security

    Sponsored by: Kony

    This complimentary resource provides two articles direct from the experts at SearchSecurity.com on how to achieve better mobile app security. Learn how to design a mobile-app security policy and discover four steps for vetting and delivering secure mobile apps.

  • Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

    Sponsored by: IBM

    In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Data Theft Prevention: The Key to Security, Growth and Innovation

    Sponsored by: Forcepoint

    In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.

  • Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks

    Sponsored by: Cloudmark

    Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.

  • Realizing the Value of Test Data Management

    Sponsored by: CA Technologies.

    This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.