Research Library

Powered by

Data Security Research

  • GDPR

    Sponsored by: RSA

    GDPR is on track to be the most significant change in global privacy laws in the past 20 years. Everyone wants to know: How will this affect my business? Read this RSA e-book to discover what you need to know about how the GDPR and EU's privacy rules could impact your business operations.

  • Protecting Users and Data with Cloud Security

    Sponsored by: Cisco Umbrella

    What can you do to mitigate the risks associated with off-network access to sensitive data and applications? View this extensive resource collection, which offers 15+ resources, some from industry analysts and experts at 451 Research and Gartner.

  • Data Protection on HCI Platforms

    Sponsored by: Hewlett Packard Enterprise

    Data protection is critical for disaster recovery and business continuity, and is one of the key evaluation markers for organizations purchasing IT infrastructure. This paper discusses HCI's impact on data protection, key factors to consider, data protection best practices and recommendations on when and how to use them for various use cases.

  • Using Hyperconverged Infrastructure to Improve Data Protection and Recovery Effectiveness

    Sponsored by: Hewlett Packard Enterprise

    IT organizations need to take a fresh look at their approach to data protection and availability, and move beyond the limitations of client/server era technologies. Access this IDC white paper to learn how hyperconverged infrastructure simplifies and improves data protection and recovery effectiveness.

  • GDPR Survival Basics

    Sponsored by: RSA

    GDPR takes effect in May 2018. How prepared is your organization? This white paper sets out 5 basic steps for organizations to consider when setting up framework for managing GDPR risk.

  • A Practical Guide for GDPR Compliance

    Sponsored by: RSA

    According to an Osterman Research report, 64% of organizations are not ready to comply with the GDPR. Grab your copy of this Osterman Research practical guide to understanding your readiness. Don't miss the checklist on page 9.

  • GDPR: What it Means to Your Cybersecurity Strategy

    Sponsored by: RSA

    More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.

  • J.B. Hunt Eases Compliance With A Smarter Approach To Information Lifecycle Governance

    Sponsored by: IBM

    J.B. Hunt Transport, Inc. has to store data securely and for a prescribed period, thereby placing a high premium on efficient, compliant content management. Find out how they drove down e-discovery costs while easing compliance with a smarter approach to information lifecycle governance.

  • How to Secure Your Data and Protect Your Bottom Line

    Sponsored by: IBM

    New technology trends, including cloud, mobile and big data, create opportunities for your enterprise to exploit analytic insights. But the same things that enable these opportunities can skyrocket your risks if proper data security and governance controls aren't in place. Learn how you can protect your data to avoid risk.

  • Data and Analytics Secrets Revealed: A Collection of Customer Stories

    Sponsored by: Splunk

    Uncover a diverse variety of customer stories – from organizations like Ubisoft, Yelp, Equinix, Domino's, and Gatwick Airport – about how they turned data into one of their leading assets with enhanced analytics, data security, IoT, and big data capabilities.

  • BI, Analytics, and the Cloud: Best Practices Report

    Sponsored by: SAP India

    This TDWI best practices report explores the current state of BI, analytics, and data management in the cloud. Uncover 12 best practices for cloud analytics, and learn about the top considerations for moving data management to the cloud.

  • How to Shift Your Analytics Strategy to Keep Up with Industry Change

    Sponsored by: Looker

    Actionable BI is critical for all organizations – but many lack the ability to analyze data quickly, comprehensively and effectively. Looking at healthcare, learn how embedded analytics tools that deliver self-service reporting capabilities can reduce barriers to success.

  • Introduction to Artificial Intelligence for Security Professionals

    Sponsored by: Cylance

    According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.

  • 10 Traits Of Successful DLP Programs

    Sponsored by: InteliSecure

    According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.

  • The Journey to Creating Value from the GDPR

    Sponsored by: IBM

    Learn about the key steps on the journey to creating value from the GDPR with a strategy for building sustainable, governed data flows.

  • Operationalize Your Organization for the GDPR

    Sponsored by: InteliSecure

    Learn how creating a general data protection regulation framework to protect critical assets, both tangible and intangible (think IP), will enable you to operationalize your GDPR compliance.

  • 5 Key Analytics and Machine Learning Takeaways

    Sponsored by: Splunk

    Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.

  • Pathways for GDPR Readiness

    Sponsored by: IBM

    The GDPR regulation can be used as a potential business opportunity for your company. Explore this white paper to learn more about getting a leg up with the GDPR journey, potential drawbacks of failing to comply with GDPR and how your company can benefit from GDPR.

  • Achieving A Unified Data Governance Strategy

    Sponsored by: IBM

    Learn how you can achieve a unified data governance strategy and delve into topics like the evolution of data governance, the impact of compliance on data, analytic insights and data monetization, and more.

  • Are You Ready? The GDPR is Here

    Sponsored by: IBM

    Non-compliance with GDPR has the potential to lead to huge fines, so now is the time to ensure you protect, govern, and know your data. Watch this webcast to learn more about preparing your organization's data and policies for GDPR.

  • Vendor Landscape: Vulnerability Management, 2017

    Sponsored by: Tenable, Inc.

    According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.

  • 5 Steps to Building a Successful Vulnerability Management Program

    Sponsored by: Tenable, Inc.

    Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    Sponsored by:

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

  • Multi-factor Authentication for dummies

    Sponsored by: iovation, Inc.

    The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.

  • 13 Essential Steps to Meeting the Security Challenges

    Sponsored by: Tenable, Inc.

    While multinational companies can likely meet some of the GDPR requirements right now, most will find that they have a lot of work to do in order to meet full compliance. Key into this white paper to gain a deeper understanding of GDPR and why the regulation is important to IT professionals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.