ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Navigating The Complexity Of Big Data Transformation

    Sponsored by: Rackspace - Intel XEON

    This Forrester Research report explores the state of big data adoption, its current challenges, and how businesses are deriving value from it. Learn about the impact of cloud adoption and the modernization of legacy systems on big data management and analytics.

  • Security Tech: Out with the Old in with the New

    Sponsored by: Citrix

    Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.

  • Manage Risk by Protecting the Apps and Data That Drive Business Productivity

    Sponsored by: Citrix

    Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements.

  • Cybersecurity Roadmap

    Sponsored by: Cisco Systems, Inc.

    Every industry can be targeted by cybercrimes one way or another. Read this white paper to uncover strategies to protect your business from cyberattacks and see how this relates to your specific industry.

  • The Security Compliance Countdown

    Sponsored by: Citrix

    Why stress over the GDPR deadline? Check out this resource to discover a to-do list to ensure you are prepared.

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • The Essential Cybersecurity Toolkit for SMBs

    Sponsored by: Datto, Inc.

    SMBs need to spread awareness to employees regarding cyberattacks. Read this e-book to take a deeper look at tactics to help benefit your company when fighting off cybercrimes.

  • The Business Guide to Ransomware

    Sponsored by: Datto, Inc.

    Implement top-notch security software to prevent the loss of data if a ransomware attack occurs. Read this e-book to discover what you can do to avoid or recover from an attack.

  • Connectivity and Colocation Support Fast Growth—and Peace of Mind

    Sponsored by: Spectrum Enterprise

    Looking ahead at the incoming monsoon of data? You need connectivity and data center tools capable of handling hundreds of terabytes of data reliably and at top speeds. This case study shows how one company solved their data dilemma.

  • Backup Vs Business Continuity

    Sponsored by: Datto, Inc.

    What will serve you better in the long run, backup or business continuity? What's the difference? How quickly can you get your business operating again in case of system failure? Access this white paper to learn why business continuity is more important than simple backup solutions.

  • Compliance Challenges & Security Effectiveness in the Workplace

    Sponsored by: Citrix

    This research report from the Ponemon Institute uncovers global trends in IT security risks, especially compliance with the EU's GDPR.

  • Assessing the Top Content-Centric Collaboration Platforms

    Sponsored by: Box

    In this Gartner Magic Quadrant, explore the current offerings for content-centric collaboration platforms that support seamless, secure file sync and sharing across devices and cloud repositories.

  • Are Small Firms Ready for the GDPR?

    Sponsored by: Avnet

    A NetApp survey finds that smaller firms are not ready for the arrival of GDPR. This e-guide reveals the details of this survey and explores what these results mean for channel data specialists.

  • Why You Shouldn't Wait to Build a Data Governance Model

    Sponsored by: ERwin

    As your company amasses data from multiple sources, you can potentially lose control over data quality and accuracy. In this expert e-guide, learn why it's time to halt the data free-for-all and apply data governance to keep your organization on track.

  • Exploring Five GDPR Compliance Myths

    Sponsored by: Avnet

    The General Data Protection Regulation (GDPR) comes into force in May 2018, and there are a few misconceptions surrounding this legislation. This e-guide explores 5 common myths surrounding GDPR to help you prepare for the deadline.

  • Are You Sure You Didn't Authorize Someone You Shouldn't Have?

    Sponsored by: HID

    Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.

  • Storage Snapshots: An Overview on the State of Data Recovery

    Sponsored by: Reduxio

    This post serves as your condensed resource on snapshots, providing an overview on snapshots' history, innovation, and use cases, as well as snapshot usage limitations. Read on to also gain a strategy for surmounting the shortcomings of snapshots, using a technique called BackDating.

  • How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges

    Sponsored by: Splunk

    One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.

  • Don't Overlook Email When Planning for GDPR Compliance

    Sponsored by: Mimecast

    With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.

  • Cloud Security: 2017 Spotlight Report

    Sponsored by: Quest

    Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

  • Security Considerations For Unstructured Data In The Cloud

    Sponsored by: Panzura

    What kind of data security and recovery can cloud services offer? This e-book discusses a 3-part data security model to keep in mind when you're looking to leverage the cloud. Discover the importance of confidentiality, integrity, and availability in securing the cloud.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview

    Sponsored by: Splunk

    In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence.

  • 5 Tips to Slay the Cloud Disaster Recovery Dragon

    Sponsored by: Commvault

    As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .

  • Getting GDPR Compliant With Your Big Data Analytics

    Sponsored by: Datameer

    Explore how to become GDPR compliant with your big data analytics. Discover 5 critical capabilities to secure and govern your data so your organization is GDPR-ready.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.