ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • NGFW Requirements for SMBs and Distributed Enterprises

    Sponsored by: Cisco Systems, Inc.

    Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • How To Get the Most Out of SOCs

    Sponsored by: ServiceNow

    This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.

  • The New Security Paradigm for Digital Government: Securing Data and Assets within an IT Ecosystem that Extends Beyond Agency Walls

    Sponsored by: Unisys

    This white paper details why federal agencies are transitioning to digital environments, the new security risks these environments present, and how to protect sensitive information from unauthorized access.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: NTT ICT

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • A themed issue looking at the latest trends in print management

    Sponsored by: MicroScope

    A themed issue of the ezine looking at the opportunities for the channel in the managed print world

  • Architecture Overview: SAP HANA with Lenovo System x and NetApp FAS/AFF Systems with NFS

    Sponsored by: SAP/Lenovo/Intel

    This document outlines an integrated SAP HANA architecture, built with tailored data center integration, Lenovo servers, and NetApp data storage systems. Read on to utilize this architecture's data protection for business-critical SAP applications; also illustrated are guidelines for implementation, DR, development, and testing.

  • File Sync and Share with Backup and Recovery Functionality

    Sponsored by: Intermedia

    Explore an enterprise file sync and share strategy with additional backup and recovery features to ensure an extra level of file resilience. See how this cost-effective solution can protect your enterprise data against any data-loss case, including both user error and threats to the environment.

  • Federal Agencies Have a BYOD Program, Like It or Not

    Sponsored by: Lookout

    Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.

  • Secure Content Collaboration Across All Devices

    Sponsored by: Citrix

    This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.

  • For Boundless Data, You Need Limitless Storage: 2016 Storage Updates

    Sponsored by: Red Hat

    See what's new in storage: learn how to scale across physical, virtual, cloud, and hybrid environments with a software-defined platform that limitlessly accommodates today's explosive data influx. Tune into this brief video as experts explain how this data management platform streamlines file and object access, and more.

  • Transform the Economics of Data Storage with Optimal Efficiency

    Sponsored by: IBM

    In this brief data sheet, learn about an enterprise-class hybrid storage solution that transforms the economics of data storage. Read on to see how it complements virtual server environments and its ability to deliver the flexibility and responsiveness your business needs.

  • Six Key Performance and Sizing Considerations When Creating Your Software-Defined Storage Cluster

    Sponsored by: Red Hat

    Designing a software-defined storage (SDS) cluster can be a complicated exercise—and one size certainly does not fit all. This webcast details the six key performance and sizing considerations to keep in mind when you create your SDS cluster.

  • 2016 Cost of Data Breach Study United States

    Sponsored by: IBM

    This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.

  • 2016 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.

  • How to Unlock EMS: 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite

    Sponsored by: Microsoft

    In the era of mobility, BYOD is a major concern. The Enterprise Mobility Suite (EMS) is a sweeping platform that works with existing cloud platforms, and covers mobile management and data protection. Access this brief resource to learn just what EMS is capable of and the value it has to offer.

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?

    Sponsored by: Dell EMC

    Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.

  • Trusted Backup and Recovery Software Solutions Simplify Administration

    Sponsored by: IBM

    Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.

  • IBM Data Protection Modernization and Strategy: An ESG Webinar

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • 2016 Cyber Security Intelligence Index

    Sponsored by: IBM

    This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • ESG Video Interview: Virtualization-Driven Data Protection Modernization

    Sponsored by: IBM

    ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.

  • Help Minimize Impact to Patient Care in the Event of a Disaster

    Sponsored by: McKesson Corporation

    Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.

  • Simplified Data Protection for the Modern Enterprise: An Expert Evaluation

    Sponsored by: IBM

    Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.