ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Moving Mountains: Tackling Disparate Systems with Data Integration

    Sponsored by: Globalscape

    This e-book explores how to create a data integration roadmap for complex, disparate systems management. Discover how to mitigate potential data security risks and reduce maintenance costs with managed file transfer (MFT), and uncover 4 signs that you're facing disparate systems challenges.

  • Managing Machine Data from POS, IoT, Sensors, and Other Data Sources

    Sponsored by: Splunk

    This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security.

  • Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them

    Sponsored by: Globalscape

    Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.

  • Middleware and Operating System Machine Data

    Sponsored by: Splunk

    This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.

  • Windows 10: The Unavoidable Upgrade

    Sponsored by: Citrix

    Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user's chosen endpoint device or operating system. Learn how.

  • The Security Compliance Countdown

    Sponsored by: Citrix

    Businesses everywhere are bracing for the GDPR takeover. See what issues are causing IT anxiety and learn what you can do to get ahead.

  • Your Data in the Cloud: Steps to a Seamless Migration

    Sponsored by: Globalscape

    90 percent of organizations are looking at moving away from their legacy systems and into crafting a cloud strategy. Making a move to the cloud is a shift forward in many ways, and can empower organizations to accomplish much more with less. In this eBook, you'll learn about several cloud migration strategies.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • IoT: How Real-Time Data and Analytics Enable Operational Intelligence

    Sponsored by: Teradata

    This white paper explores how to update your data management and analytics strategies for the increased volumes, security risks, and complexities of IoT. Learn how to improve your organization's decision-making and start planning for you future in IoT with 10 best practice recommendations.

  • 5-Step Data Quality Framework For Data In Motion

    Sponsored by: Infogix

    6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.

  • 4 Mobile Security Insights for CISOs

    Sponsored by: Lookout

    Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.

  • The EU General Data Protection Regulation (GDPR): A Pocket Guide

    Sponsored by: DataStax

    Under the General Data Protection Regulation (GDPR), businesses that fail to comply and suffer a data breach could face huge fines. In this comprehensive pocket guide, learn what you need to know to comply with the GDPR, including a history of data protection, the rules of the Regulation itself, how to appropriately comply, and more.

  • Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

    Sponsored by: Nerdio

    Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.

  • Bracing for Digital Disruption: What the CIO Needs to Know

    Sponsored by: Infor

    This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.

  • Citrix ShareFile eases IT migration to Windows 10®

    Sponsored by: Citrix

    Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.

  • Hybrid Cloud & Data Fabric For Dummies

    Sponsored by: NetApp SolidFire

    Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.

  • MobileIron and iOS: The Security Backbone for the Modern Enterprise

    Sponsored by: MobileIron

    Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • Infographic: IoT at Enterprise Scale - 6 Best Practices

    Sponsored by: VMware

    The Internet of Things (IoT) is introducing new challenges to traditional operations environments. Access this infographic to prepare for an onslaught of IoT use cases and refocus your strategy to focus on scale, complexity, and security.

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

  • The 5 Features of an Always On Data Platform

    Sponsored by: DataStax

    Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more.

  • Data Center Services: Trust the Professionals

    Sponsored by: Comarch

    Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.

  • 5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy

    Sponsored by: BlackBerry

    In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.

  • Top Mobile Security Threats IT Needs to Know About

    Sponsored by: BlackBerry

    In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.