Research Library

Powered by

Data Security Research

  • Why a Secure Enterprise Workspace is the Best Approach for Mobile Productivity

    Sponsored by: Dell, Inc. and Intel®

    Inside this white paper, explore how a secure enterprise workspace can help to improve mobile productivity while meeting your organizations requirements for security, manageability, and configurability.

  • The Security and Regulatory Drivers for Information Rights Management

    Sponsored by: IntraLinks, Inc

    This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.

  • Securing Collaborative Data

    Sponsored by: IntraLinks, Inc

    This case study explores how to secure remote users and manage documents to eliminate multiple versions and confusion.

  • Next Generation Security for Virtualized Datacenters

    Sponsored by: BitDefender

    In this white paper, discover what a virtual environment needs in order to maintain its security.

  • Faster Speed-to-Market Through Secure Information Sharing

    Sponsored by: IntraLinks, Inc

    This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.

  • Dell Data Protection: Protected Workspace, Preventing Malware Attacks

    Sponsored by: Dell, Inc. & Intel®

    Access this white paper to learn how application virtualization can be used to create a protective barrier around applications that employees use that run untrusted content. Find out the steps involved in this process and how this can prevent attackers from ultimately gaining access to endpoints.

  • Flexible, secure solutions to keep unauthorized users out of your data

    Sponsored by: Dell, Inc. and Intel®

    Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.

  • A New Aproach to Payment Verification

    Sponsored by: Nexmo

    This white paper explores how to use phone number verification to ensure security and compliance in a simple process. Access now to learn why this technology is rising in prominence and uncover the seven key components to look for in a third-party service.

  • Keeping Applications Safe with Whitelisting

    Sponsored by: Digital Guardian

    This eguide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.

  • The Secure Mobile Enterprise

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.

  • Keep Software Secure Using RASP

    Sponsored by: Prevoty

    This expert e-guide explores if RASP is the savior of security officers or if it's just the new flavor of the week. View now to learn about the two approaches to RASP and the potential red flags of using this technology.

  • Data Center Security: A Comprehensive Guide to Mitigating Data Center Risks

    Sponsored by: Alcatel-Lucent

    Read this white paper to learn about a holistic approach to data center security that will detect more threats, launch more effective counterattacks and better protect your data overall.

  • Oracle MAA Reference Architectures

    Sponsored by: Oracle Corporation

    View this informative white paper for a detailed discussion of four high availability reference architecture and the accompanying service level objectives that can be achieved.

  • Bringing Ideas to Life in a Continuously Protected Environment

    Sponsored by: Dell, Inc. and Intel®

    Access this case study to discover how one organization implemented leading Dell workstations and desktops to fully equip employees with a customized workspace to meet their project needs and enhance their productivity.

  • Addressing NIST and DOD Requirements for Mobile Device Management

    Sponsored by: IBM

    Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as how to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.

  • The Key to Smarter Enterprise Code Signing

    Sponsored by: Symantec

    This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.

  • Secure network traffic between hosts systems and remote PCs/web browsers

    Sponsored by: OpenText

    Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.

  • Improving the Effectiveness of Log Analysis

    Sponsored by: Hewlett-Packard Company

    This white paper acts as a buyer's guide for log monitoring and management solutions and points out the five key features you need to ensure data protection.

  • Big Data Governance and Metadata Management

    Sponsored by: Oracle Corporation

    View this webcast to learn how you can step up your data systems and manage Big Data effectively.

  • Avoiding the Headlines: 5 Critical Security Practices to Implement Now

    Sponsored by: CloudPassage

    Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.

  • Device and Data Protection - Part 3

    Sponsored by: Dell, Inc. and Intel®

    This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.

  • Top 10 Reasons to Monitor Privileged Users

    Sponsored by: BalaBit

    In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.

  • Device and Data Protection - Part 2

    Sponsored by: Dell, Inc. and Intel®

    Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.

  • Control Your IT Staff

    Sponsored by: BalaBit

    In this white paper, discover how privileged activity monitoring can easily collect data about what your privileged users are doing.

  • Securing #GenMobile: Is Your Business Running the Risk?

    Sponsored by: Aruba Networks

    This white paper outlines a 5 step mobile security strategy to mitigating the risks created by #GenMobile. View now to learn how to adapt your data protection to prevent loss.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.