ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Building the Business Case for Cloud Backup

    Sponsored by: Druva Software

    Download this resource to overcome legacy VM data protection complexity with cloud-native backup and recovery. Discover why enterprises employ this method as a cost-effective alternative to traditional DR by learning 5 reasons for migrating backup and archiving to a single, cloud-native platform.

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • Manage Application Security Risks to Help Protect your Organization’s Critical Data

    Sponsored by: IBM

    Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Tackling Insider Threats

    Sponsored by: Intel Security

    Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • How to Prepare for Out-of-Control Data Growth

    Sponsored by: Micron

    If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros.

  • How to Plan Your Hybrid Cloud Backup Strategy

    Sponsored by: Colospace Inc.

    Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.

  • Top 10 Reasons Quorum Beats the Competition

    Sponsored by: QuorumLabs Inc.

    Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.

  • Lowering Business Risk with Data

    Sponsored by: Cloudera

    Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.

  • Ensure A Safe, Successful Move To The Cloud With A Good Information Governance Plan

    Sponsored by: IBM

    The benefits of moving data to the cloud are numerous, but doing so without an information governance plan in place can cause more problems than it solves. In this white paper, learn how you can create an effective information governance methodology and increase your success of migrating safely to the cloud.

  • Cloud Security and Content Management: Box Case Study

    Sponsored by: IBM

    Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.

  • Box: Securing Business Information in the Cloud

    Sponsored by: IBM

    Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.

  • Disaster Recovery Guide

    Sponsored by: Zerto

    Use this Disaster Recovery Guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud. And compare different BD/DR technologies.

  • Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah

    Sponsored by: QuorumLabs Inc.

    Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.

  • How to Plan For The General Data Protection Regulation & Govern Your Data

    Sponsored by: IBM

    Customer information can offer invaluable insights into trends, behavior and spending habits. However, using and storing personal information can also be a big risk to organizations if not handled properly. In this white paper, learn about the General Data Protection Regulation (GDPR), including how to protect and govern your organization's data.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Securing the Most Important Apps and Data—Yours

    Sponsored by: Citrix

    Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.

  • Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery

    Sponsored by: QuorumLabs Inc.

    Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.

  • How The US Navy Helped Transform Today's BDR Market

    Sponsored by: QuorumLabs Inc.

    This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Security for the Future-Ready Workforce

    Sponsored by: Dell India

    To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.

  • Survey Findings: Data Security

    Sponsored by: Dell India

    This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.