ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Discover the Cloudification of Healthcare IT

    Sponsored by: Pure Storage

    The path to cloud has not been without hurdles, raising issues such as: Is clinical data safe? Is the platform compliant? Access this post to hear what other IT executives have to say about the cloudification of healthcare IT, and their respective decisions to adopt, or not adopt, cloud platforms.

  • Tackle Insider Threats Head-On By Building A Proactive Security Culture

    Sponsored by: Intel Security

    More than 40% of data loss is caused by company insiders. Use this white paper to find ways your company can reduce the chance of internal data loss by fostering a trusted security culture, creating employee profiles and more. Then, discover a security program that offers a myriad of protections from insider threats.

  • Analyzing the Top 8 Indicators of Threat Traffic

    Sponsored by: LogRhythm, Inc.

    While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic.

  • Clayton Utz Achieves Information Security and Data Protection Goals

    Sponsored by: Hewlett-Packard Enterprise

    In this case study, you'll learn how one law firm ensured simple administration of the rapid growth in data for them and their clients. Read on and discover ways to support business and IT requirements for cost-effective data storage.

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: LogicNow

    Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.

  • StorageCraft Cloud Backup for Office 365

    Sponsored by: StorageCraft Technology Corporation

    This white paper describes a cloud backup product designed for Office 365. The article explains key features and benefits of this flexible, easy-to-use solution for the protection, management and recovery of Office 365 data.

  • Ransomware: Mitigating the Threat

    Sponsored by: Zerto

    Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.

  • StorageCraft Cloud Backup at a Glance

    Sponsored by: StorageCraft Technology Corporation

    This white paper describes a cloud backup product and outlines key features surrounding its ease of use, security, recoverability and customization.

  • Overcome Storage Capacity Conundrums Created by Data-driven Genomics Approaches

    Sponsored by: Pure Storage

    Download this resource to support the massive growth rate of data in precision medicine with a smart storage architecture that enables superior performance in a high-density form factor. Learn how to overcome the capacity constraints of legacy storage with a platform that will improve the clinician experience.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.

  • Revitalizing Storage Infrastructure: AUT Tackles Expanding Data Problems

    Sponsored by: Hewlett-Packard Enterprise

    Follow Aukland University of Technology's journey to discovering a secure storage platform that radically improved their ability to deliver high performance storage capabilities to staff and students. Discover how they enabled better data management, shored up their infrastructure with enhanced backups, and more.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience

    Sponsored by: TIBCO Software Inc.

    Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • 5 Questions to Ask Data Protection Vendors

    Sponsored by: Commvault

    Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.

  • 8 Decisive Factors For A Successful Employee Engagement Program

    Sponsored by: IBM

    Employee engagement programs help both the employee and the organization, and improve the overall chance of success. Access this study to uncover which 8 factors determine an employee engagement program's success.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.

  • Important Considerations for Comparing Data Protection Vendors

    Sponsored by: Commvault

    What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.

  • Top Reasons Why Customers Deploy Flash Storage

    Sponsored by: TechData - EMC

    Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: TechData - EMC

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Building Better Business Analytics to Improve BI

    Sponsored by: Pyramid Analytics

    Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.

  • Protecting the Distributed Enterprise

    Sponsored by: Fortinet, Inc.

    Discover how to protect your distributed enterprise without compromising data access. Uncover the 5 requirements for a distributed enterprise firewall.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • Eight emerging data center trends to follow in 2016

    Sponsored by: Chatsworth Products Europe

    Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.