ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • The 6 Phases of a DDoS Incident Response Plan

    Sponsored by: Arbor Networks

    Any enterprise that operates online needs to have robust defenses to detect and mitigate DDoS attacks. Key into this white paper to learn about how you can protect your organization against harmful DDoS attacks.

  • The Three Faces Of Insider Threat

    Sponsored by: Absolute

    Insider threats are an extremely challenging IT issue to resolve. In this white paper, uncover how to protect your organization against insider threats.

  • Why Banks Need a Dedicated Mobile Banking Security System

    Sponsored by: HID Global

    According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals frequently asked questions by consumers regarding mobile security.

  • 3 Types of SSL Certificates

    Sponsored by: HID Global

    Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.

  • Managing Data is Key to a Successful Multi-Cloud Strategy

    Sponsored by: Veritas

    90% of enterprises will have multi-cloud deployments by 2018. While cloud adoption is growing dramatically, only 31% have mature strategies in place. The key to a successful strategy? Data management. Read this infographic to learn about the key aspects of data management that you will need to nail down to implement a successful cloud strategy.

  • Check Your Armor: What's Your Most Vulnerable Cybersecurity Spot?

    Sponsored by: Simeio

    When a company experiences a data breach, hack or other compromise to infrastructure or assets, the company does not realize all of the risk mitigation steps that were overlooked. This white paper reveals a comprehensive identity checklist to ensure your company does not fall victim to a data breach in the first place.

  • Complying with GDPR: What All Organizations Need to Know

    Sponsored by: Absolute

    With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.

  • A Minute in the Life of Google's Security Infrastructure

    Sponsored by: Google Cloud

    Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Sponsored by: AlienVault

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover steps to take to make the compliance process easy and secure.

  • 10 Tips to Thrive in the Subscription Economy

    Sponsored by: Adyen

    Learn 10 tips to thrive in the subscription economy so that you can improve customer experiences and discover a payment platform designed to help you optimize growth across online, in-app, and in-store channels.

  • Threat Intelligence Evaluator's Guide

    Sponsored by: AlienVault

    One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.

  • Veritas Strengthens Position in Multicloud, Hybrid IT World with Cloud Data Management and Protection Strategies

    Sponsored by: Veritas

    This IDC Market Perspective focuses on multicloud, hybrid IT world. By adding to its collaboration with AWS, Microsoft Azure, and Red Hat OpenStack, Veritas now has a partnership with Google and IBM, and is strengthening its position to provide holistic information management capabilities and data protection in the multicloud, hybrid IT world.

  • 4 Ways to Ensure a Smooth Windows 10 Migration

    Sponsored by: Citrix

    Download this resource to discover a workspace suite that can help enable a smooth Windows 10 transition with a 4-pronged approach to address challenges with app migration, managing Windows 10 desktops, managing all devices, and securing company data.

  • 2017 Veritas GDPR Report Chapter 1

    Sponsored by: Veritas

    According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.

  • 7 Features You'll Find in the Most Advanced DLP Systems

    Sponsored by: Symantec & Blue Coat Systems

    Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.

  • Anti-Virus Comparative

    Sponsored by: Symantec & Blue Coat Systems

    Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.

  • Case Study: Hyundai Department Store Group

    Sponsored by: Symantec & Blue Coat Systems

    Hyundai Department Store Group faced the challenges of needing to comply with the South Korean Personal Information Protection Act and put customers at ease that their personal information would be protected. In this case study, explore how Hyundai overcame this issue by implementing data loss prevention strategies.

  • Amazon Web Services: Overview of Security Processes

    Sponsored by: Amazon Web Services

    You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.

  • GDPR Strategy Guide

    Sponsored by: Veritas

    The GDPR obliges businesses to understand and map how personal data flows throughout their organization in the form of Article 30 record. Jump start your compliance journey with this Veritas GDPR Strategy Guide to Article 30 creation.

  • 5 Data Management Tips to Build a Successful Multi-Cloud Strategy

    Sponsored by: Veritas

    Many organizations are utilizing a multi-cloud strategy but without proper data management, this environment can increase costs and business risk. Learn how to maximize the benefits of the multi-cloud environment through these 5 data management tips.

  • The Buck Stops Where?

    Sponsored by: BitSight

    By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.

  • Why Data Protection Is the Cornerstone of Modern Enterprise Security

    Sponsored by: Symantec & Blue Coat Systems

    According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.

  • A 5 Minute Guide to Cognitive Search for the Life Sciences

    Sponsored by: Attivio, Inc.

    Learn about cognitive search platforms and find out how to analyze any type of data, integrate behavioral data to personalize user experiences, scale for big data, enhance data security, and more.

  • Endpoint Security - Market Quadrant 2016

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.