ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intellectual PropertyResearch

  • All Data Archive Tools Are Not Created Equal: The Importance of Index and Search

    Sponsored by: Rand Secure Data

    Find out how a comprehensive archiving solution with index and search capabilities can help your company maximize the value of intellectual property, and contribute to successful data governance.

  • What's Behind a Cyber Attack?

    Sponsored by: IBM

    This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.

  • Tactics to combat insider threat

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Sponsored by: Neustar®

    This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.

  • An Inside Track on Insider Threats

    Sponsored by: Imperva

    Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Analyst advice for IT security leaders

    Sponsored by: IBM

    Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.

  • Targeted attacks and how to defend against them

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.

  • Three Critical Decisions You Need to Make at the First Sign of a Security Breach

    Sponsored by: Dell SecureWorks UK

    Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.

  • Beyond Big Data – The New Information Economy

    Sponsored by: ComputerWeekly.com

    How information is managed is more important than 'big data', say analysts Clive Longbottom and Rob Bamforth.

  • Negotiating cloud contracts

    Sponsored by: ComputerWeekly.com

    This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.

  • The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods

    Sponsored by: Trusteer

    In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Read on to discover the growing need for effective antimalware today and more.

  • The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment

    Sponsored by: ComputerWeekly.com

    This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.

  • The Future of Innovation Management: The Next 10 Years

    Sponsored by: ComputerWeekly.com

    Download this report from Arthur D Little to learn 5 key innovation concepts for CIOs and CTOs.

  • How to create an effective data protection strategy for IT compliance

    Sponsored by: SearchSecurity.com

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • Storage Magazine: How to improve your virtual server storage setups

    Sponsored by: IBM.

    In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.

  • Solitarie Interglobal: Tracked, Hacked and Attacked

    Sponsored by: IBM.

    Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn

    Sponsored by: Symantec Corporation

    Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Data Loss Prevention Requirements Roadmap

    Sponsored by: CA Technologies.

    The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.

  • The Future of Authentication for Online Services

    Sponsored by: SafeNet, Inc.

    In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.

  • Implementing an Effective Data Loss Prevention Solution for Your Network

    Sponsored by: IBM

    Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.

  • Data Breaches in the US

    Sponsored by: Quantum Corporation

    Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.