ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Market Guide for Merchant and Acquirer Tokenization of Payrment Card Data

    Sponsored by: Vormetric

    The tokenization of sensitive data is a key component in the ensuring of payment system security. Chief information security officers at cardacceptors and payment processors should use this Market Guide to choose the most appropriate products for their tokenization projects.

  • Bloor: For the EU's new data protection regulation, encryption should be the default.

    Sponsored by: Vormetric

    This white paper discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. It should be part of a comprehensive, consistent data security strategy.

  • Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.

    Sponsored by: Vormetric

    In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.

  • Putting Military Strategy to Work Against Malicious Activity

    Sponsored by: AlienVault

    Discover how your enterprise can put the OODA Loop philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breeches. Lean to observe a crisis from all angles, review events in the context of other activity on network to establish a timeline, quickly implement remediation on affected assets, and more.

  • Cb Endpoint Security Platform

    Sponsored by: Carbon Black

    Discover how to stop more attacks, see more threats, and close every vulnerability your endpoints currently have. Utilize both machine learning and behavioral analytics to analyze all available endpoint data. The end result: zero-gap protection for all your endpoints.

  • Rethinking Data Discovery And Data Classification

    Sponsored by: IBM

    Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Accelerated i/O for Cloud Storage

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Infographic – IRM Underground Data Center

    Sponsored by: Iron Mountain

    Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.

  • Key Features and Functions of EMC Isilon in Big Data Workflows

    Sponsored by: EMC

    This white paper evaluates a scale-out data lake platform that provides robust multi-protocol ingest capabilities to make it easier to build a Big Data workflow in a data lake. Learn more about the key features of this solution and see how it can enable your enterprise to simplify your data management operations and keep your data secure.

  • Secure, Scalable Collaboration with Predictable GPU Acceleration and Low TCO

    Sponsored by: AMD

    Discover how manufacturers can stay competitive in today's economy with VDI powered by hardware-based GPU virtualization technology and see benefits including empowering mobility and collaboration, safeguarding sensitive data, efficient IT management, and more.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Strongarm's Malware Protection Solution Works

    Sponsored by: eTECH Channel

    You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.

  • Easy Collaboration and Version Control with Full GPU Performance and Data Security

    Sponsored by: AMD

    Learn how VDI powered by hardware-based virtualized GPU technology empowers GPU-accelerated mobility and collaboration while simplifying version control, safeguarding sensitive data, and more.

  • Defending the Indefensible: Preparing for an Uncertain Digital Future

    Sponsored by: LogRhythm, Inc.

    The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.

  • 10 REASONS TO TEST, NOT GUESS

    Sponsored by: Trustwave

    This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.

  • Reference Guide: Acceptable Use Policy

    Sponsored by: Navex Global

    This reference guide provides an example of an acceptable use policy of computer systems at an organization. Use this sample as a guideline for developing your own policy.

  • IT Security for Retail

    Sponsored by: Trustwave

    This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.

  • Simple, Secure, Affordable Hosted Archiving

    Sponsored by: eTECH Channel

    Explore a reliable and secure enterprise archiving solution that eliminates the need for additional storage management by securing data in off-site locations. Discover how this solution can enable your enterprise to boost the efficiency of your diagnostics, search and recovery, and data security capabilities.

  • Get the Incident Responder’s Field Guide: Lessons from a Fortune 100 Incident Response Leader

    Sponsored by: Digital Guardian

    The Digital Guardian Incident Responder's Field Guide provides a formal, coordinated approach for responding to security attacks that affect information assets. Written by Tim Bandos, a former Fortune 100 cyber security leader, this e-book provides easy-to-follow steps for crafting an Incident Response plan.

  • Don't Let Your Data Outgrow You: Stay Ahead with Smart, Scalable Archiving

    Sponsored by: EMC

    Explore an efficient, scalable disk-based archive solution that can enable your enterprise to simplify data management and protection, scale capacity quickly without disruption, optimize with automated storage tiering, and more.

  • 2016 Security Pressures Report

    Sponsored by: Trustwave

    The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • Archive All of Your Business Critical Data in One Archive

    Sponsored by: eTECH Channel

    Explore a data archive solution that de-duplicates, indexes, compresses, and archives data. Discover how this platform can provide your enterprise with the speed and storage necessary to handle increased volumes and variety of email, social media, and other data sources.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.