ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Building Success: Strengthen your Data Discovery and Classification

    Sponsored by: IBM

    How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Infographic – IRM Underground Data Center

    Sponsored by: Iron Mountain

    Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.

  • Key Features and Functions of EMC Isilon in Big Data Workflows

    Sponsored by: EMC

    This white paper evaluates a scale-out data lake platform that provides robust multi-protocol ingest capabilities to make it easier to build a Big Data workflow in a data lake. Learn more about the key features of this solution and see how it can enable your enterprise to simplify your data management operations and keep your data secure.

  • Secure, Scalable Collaboration with Predictable GPU Acceleration and Low TCO

    Sponsored by: AMD

    Discover how manufacturers can stay competitive in today's economy with VDI powered by hardware-based GPU virtualization technology and see benefits including empowering mobility and collaboration, safeguarding sensitive data, efficient IT management, and more.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Easy Collaboration and Version Control with Full GPU Performance and Data Security

    Sponsored by: AMD

    Learn how VDI powered by hardware-based virtualized GPU technology empowers GPU-accelerated mobility and collaboration while simplifying version control, safeguarding sensitive data, and more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 10 REASONS TO TEST, NOT GUESS

    Sponsored by: Trustwave

    This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.

  • The Most Dangerous Cybersecurity Threat Might Be Sitting Next to You

    Sponsored by: Imperva

    This infographic shows you different departments throughout your organization and the high risk actions they perform every day. Whether they be malicious users, compromised users or just careless users, it's possible your own employees are the biggest threat to your data security right now.

  • Online Phishing

    Sponsored by: Navex Global

    Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.

  • Reference Guide: Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Simple, Secure, Affordable Hosted Archiving

    Sponsored by: eTECH Channel

    Explore a reliable and secure enterprise archiving solution that eliminates the need for additional storage management by securing data in off-site locations. Discover how this solution can enable your enterprise to boost the efficiency of your diagnostics, search and recovery, and data security capabilities.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • Tale of the Tape: Moving Backup and Recovery to the Cloud

    Sponsored by: Iron Mountain

    Discover a cloud-based data replication solution that effectively protects and recovers data as well as boosts efficiency and connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.

  • Don't Let Your Data Outgrow You: Stay Ahead with Smart, Scalable Archiving

    Sponsored by: EMC

    Explore an efficient, scalable disk-based archive solution that can enable your enterprise to simplify data management and protection, scale capacity quickly without disruption, optimize with automated storage tiering, and more.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Archive All of Your Business Critical Data in One Archive

    Sponsored by: eTECH Channel

    Explore a data archive solution that de-duplicates, indexes, compresses, and archives data. Discover how this platform can provide your enterprise with the speed and storage necessary to handle increased volumes and variety of email, social media, and other data sources.

  • Salesforce Shield for Healthcare

    Sponsored by: Salesforce.com

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

  • How to Protect Your Data in a Converged Infrastructure Environment

    Sponsored by: Hewlett Packard Enterprise

    Download this infographic to improve capacity utilization for the new influx of mobile, cloud, and big data with a converged storage environment. Learn why you should consider a converged storage environment to optimize your data protection and enable seamless data movement between devices.

  • Close Security Gaps for Every Endpoint

    Sponsored by: Carbon Black

    Learn how you can utilize both machine learning and behavioral analytics to analyze all available endpoint data, helping you stop more attacks, see more threats, and close every vulnerability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.