ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Reviewing the Current State of Hyperconvergence and Benefits of Virtual SAN Deployments

    Sponsored by: VMware

    Discover the top 2016 trends driving organizations to deploy hyperconverged infrastructure. Read on to also see illustrated the benefits achieved from HCI built on virtual SAN for 3rd Platform technologies.

  • How to Determine if Cloud ERP Software is Right for You

    Sponsored by: Sage Software

    Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.

  • Manage Risk by Protecting the Apps and Data that Drive Business Productivity

    Sponsored by: Citrix

    Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.

  • Two-Factor Authentication Helps Officers Protect and Serve New York

    Sponsored by: BlackBerry

    Learn how the field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents, keep their database safe, and enable secure mobility.

  • Autodata Speeds the Delivery of Information with API Management

    Sponsored by: TIBCO Software Inc.

    This case study explores how Autodata implemented an integrated API management platform to simplify key development processes and create new opportunities for IoT. Discover how they leveraged APIs to improve customer service, enhance data security, and more.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Secure Email Against Targeted Phishing Attacks

    Sponsored by: Symantec & Blue Coat Systems

    To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.

  • McAfee Enterprise Security Manager: Discover. Prioritize. Respond. Adapt.

    Sponsored by: Intel Security

    Learn how to optimize security operations with real-time and historical visibility to improve operational efficiency across your entire security infrastructure. Resolve threats faster with fewer resources, reduce complexity and shut down new threats as they emerge.

  • Discover the Cloudification of Healthcare IT

    Sponsored by: Pure Storage

    Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.

  • An MSP Guide to Selling IT Security

    Sponsored by: Solarwinds MSP

    Discover a roadmap to enhance your MSP offering with security services, why you should take a layered security approach, and 5 tips for selling IT security. Access now and unveil how to expand upon your existing toolkit and evolve from MSP to MSSP.

  • Ransomware: Mitigating the Threat

    Sponsored by: Zerto

    Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling effects don't threaten your business.

  • Overcome Storage Capacity Conundrums of Genomics and Precision Medicine

    Sponsored by: Pure Storage

    Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Discover why and how IT security strategies are evolving from the survey results of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience

    Sponsored by: TIBCO Software Inc.

    Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • 5 Questions to Ask Data Protection Vendors

    Sponsored by: Commvault

    Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • Eight Emerging Data Center Trends to Follow in 2016

    Sponsored by: Chatsworth Products Europe

    Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.