ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • The Pros and Cons of Microsegmentation for your Virtualized Environments

    Sponsored by: NTT Com Security (UK) Ltd

    Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.

  • Case Study: Outwood Grange Academics Trust Ensures Teaching Continuity with UDP

    Sponsored by: arcserve

    Explore one organization's decision to deploy a Unified Data Protection (UDP) solution to streamline and protect their diverse IT infrastructure and backup tools. By implementing this UDP system, your enterprise can reduce your backup windows and storage needs, achieve longer data retention times, and more.

  • Case Study: The open University Protects Research Initiative with UDP

    Sponsored by: arcserve

    Witness how The Open University, a university in the UK, implemented a Unified Data Protection (UDP) solution that enabled them to efficiently back up and recover data over a SAN environment. Explore how you can ensure secure, continuous access to your data with this solution.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyber attack. Other benefits, like good data governance and responsible stewardship, are less tangible, but inspire confidence and can reinforce your good reputation. Discover how to emerge from every data breach unscathed, public image intact.

  • The Cost of Unintentional Insider Threat

    Sponsored by: Forcepoint

    A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Case Study: NCG Safeguards Learning Experience for Students with UDP

    Sponsored by: arcserve

    NCG, an education organization, decided to implement a Unified Data Protection (UDP) solution with robust deduplication and compression features to solve their data management struggles. Discover how a UDP solution can safeguard your data and enable your enterprise to save significantly in terms of storage space, staff time, and licensing fees.

  • Case Study: Konvert Reduces Business Risk and Simplifies IT Management withUDP

    Sponsored by: arcserve

    Witness how Konvert, an employment agency, replaced their existing, unstable backup with a Unified Data Protection (UDP) solution for better backup management across all of their offices. Explore how this solution enabled Konvert to minimize data storage requirements, simplify backup management, speed up data recovery, and more.

  • VM Data Protection for Dummies

    Sponsored by: Veeam and Quantum

    Discover innovative, modern data protection solutions for data in virtualized environments and explore best practices for choosing the VM protection solution that's right for your enterprise. With the right solution, your enterprise can cost-efficiently secure your virtual environments and backup your data.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Case Study: Hunters Safeguards 150TB of Architectural Data with Arcserve UDP

    Sponsored by: arcserve

    In this case study, witness how Hunters, a consultancy firm, implemented a Unified Data Protection (UDP) solution that automatically generated backup reports and minimized their storage requirements and costs with integrated deduplication capabilities.

  • EMEA: Rethinking the Cyber Security Disconnect to Save Money

    Sponsored by: VMware

    Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.

  • IBM Security QRadar: SIEM Product Overview

    Sponsored by: IBM

    In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.

  • Top 10 Reasons to choose EMC Data Protection Solutions

    Sponsored by: Richardson Eyres

    Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.

  • The Axway MFT Solution Transcript

    Sponsored by: Axway

    It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.

  • Axway Use Cases- Transcript

    Sponsored by: Axway

    Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.

  • MFT as a Shared Service- Transcript

    Sponsored by: Axway

    Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.

  • Best Practices for Safeguarding Patient Records and Sensitive Information

    Sponsored by: Symantec Corporation

    In this exclusive white paper uncover the 101 on safeguarding patient records and sensitive information. Read on to learn about topics like, managing data on-premises and in the cloud, data loss prevention, and much more.

  • Unlocking the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • Data Refinement: Facilitating the data-driven organization

    Sponsored by: IBM

    This comprehensive Forrester report found that well-planned and executed data refinement is the new benchmark of success. Read on to learn more about data refinement including key aspects, where you should place your investments, and how to make it work for your business.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Netsync

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: TechData - EMC

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Top Reasons Why Customers Deploy Hybrid Storage

    Sponsored by: EMC and Arraya

    Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.

  • Power the New Style of Business: HPE Data Center Platform Consulting Services

    Sponsored by: Hewlett Packard Enterprise

    In this brochure, you will learn how HPE Platform Consulting Services can make your technology infrastructure environments more efficient and agile for the New Style of IT. It will also tell you how to take advantage of "on-demand IT" innovations such as cloud, converged, and software-defined technologies.

  • Customer Use Cases: Implementing Unified Data Protection Solutions

    Sponsored by: arcserve

    In this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.