ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Transform Your Business Processes with Integrated Copy Data Management

    Sponsored by: emc first distribution

    Consolidate both primary data and its associated copies on the same scale-out all-flash array for unprecedented agility and efficiency with integrated copy data management (iCDM), a new approach to consolidation without compromise. Read on to overcome storage sprawl, SLA issues, and limitations on copy frequency with CDM workload automation.

  • The Road to SDN is Paved with Visibility and Many Good Intentions

    Sponsored by: Gigamon

    Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.

  • Addressing the Threat Within: Rethinking Network Security Deployment

    Sponsored by: Gigamon

    A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.

  • Application Session Filtering

    Sponsored by: Gigamon

    Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.

  • Discover Today's Unstoppable Data Reduction

    Sponsored by: emc first distribution

    Examine a highly integrated, always-on in-line data optimization architecture that multiplies your overall investment in flash across all business apps. Extend the endurance of flash media with comprehensive data reduction for all-flash arrays, and extract the most value from your investment.

  • Facing Network Breach Threats, Visibility Is Key

    Sponsored by: Intel

    If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.

  • IDC Server Security: Virtualization and Cloud Changes Everything

    Sponsored by: TrendMicro

    Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.

  • Complete Data Protection (Advanced) - Data Sheet

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • Data Loss Prevention Best Practices for Health Care

    Sponsored by: Intel Security

    Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.

  • Why Converged Backup Platforms is Your Key to Scalability

    Sponsored by: Veritas

    Discover how one converged backup platform compares to its competitors, matching up VADP performance results, storage-array snapshots-based backup, and concurrent application restores. Read on to see how this solution can lower your total backup costs, improve your overall backup performance, and create better system utilization.

  • Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise

    Sponsored by: Kaspersky Lab

    A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • The Definitive Guide to Data Loss Prevention

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts

  • Management of Native Encryption for Apple FileVault and Microsoft BitLocker

    Sponsored by: Intel Security

    With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.

  • Data Protection Considerations for Converged Infrastructure

    Sponsored by: Veritas

    Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.

  • Keep Cloud Applications Secure During The DevOps Process

    Sponsored by: CloudPassage

    To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.

  • George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture

    Sponsored by: Gigamon

    Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.

  • Three Critical Considerations to Achieve Information Governance

    Sponsored by: Commvault

    Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • IBM Data Protection for Virtual Environments

    Sponsored by: IBM

    Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.