Research Library

Powered by

Data Security White Papers

  • Why Email Security Matters: The Advantages of Hosted Protection

    Sponsored by: LogicNow

    Discover the key advantages of hosted email protection. Read on to discover this method's detailed protection mechanisms, which include blacklisting, anti-spam engines that look for telltale signatures, and real-time message source evaluation.

  • Data Protection in Two Dimensions

    Sponsored by: EOH IBM

    Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.

  • 5 Essentials for Achieving Cloud Archiving Success

    Sponsored by: Mimecast

    Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.

  • 12 Hours: The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment

    Sponsored by: Armor

    This infographic shows you an hour by hour breakdown through the typical "secure" environment so you can better understand how threat actors carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.

  • The Evolution of Locky Ransomware's Javascript Downloaders

    Sponsored by: Booz Allen Hamilton

    Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.

  • Plan for Disaster Recovery Based on Specific Threat Considerations

    Sponsored by: LogicNow

    Benjamin Franklin's adage 'an ounce of prevention is worth a pound of cure' holds true for disaster recovery scenarios. Being proactive is better than being reactive. Download this e-book to access 5 key questions to ask yourself when planning and future-proofing your disaster recovery strategies.

  • Enterprise Security Gets Adaptive

    Sponsored by: Kaspersky Lab

    This paper explores how to implement a more adaptive, integrated approach to app security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help your strategies for defending against advanced persistent threats (APTs) become more proactive and intelligence-driven.

  • How to Choose the Right Disaster Recovery Solution

    Sponsored by: LogicNow

    In this e-book, you will learn how to formulate tactical backup and recovery by considering the possible disasters, matching them with the data sets to be protected, and identifying key recovery objectives. Read on to build a DR solution requirements list that specifically matches your organization's needs.

  • Architecture Matters: Increasing Oracle Database Security Without Application Performance Loss

    Sponsored by: Oracle Corporation UK Ltd

    Learn how to implement strong security policies and best practices to safeguard data and, optimize performance and increase application availability.

  • The Fully Encrypted Data Center: Encrypting your Data Center on Oracle's SPARC Servers (Technical White Paper)

    Sponsored by: Oracle Corporation UK Ltd

    This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers.

  • Security for Virtualization

    Sponsored by: Kaspersky Lab

    Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. This product overview highlights a complete, security tool designed for virtualization platform technologies that barely impacts performance.

  • Case Study: Vigilias Expands Telehealth to Rural Communities

    Sponsored by: Ambra

    This brief case study illustrates how Vigilias, healthcare communications provider, overcame its outdated hardware to implement a cloud-based PACS that not only reduced their cumbersome number of systems, but also enabled them to seamlessly provide access to studies across disparate EMRs.

  • Game Over: 3 Scenarios Where Compliance Isn't Enough

    Sponsored by: Armor

    Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.

  • Security & Compliance Are No Gamble

    Sponsored by: Armor

    Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.

  • Information Security Reference Guide

    Sponsored by: Navex Global

    This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Based on ISO and the International Electrotechnical Commission (EC) standards, it lays out a definite structure for information security, access control and compliance among many other critical areas.

  • Alleviating Oracle Database DBA Data Protection Frustration

    Sponsored by: Oracle Corporation UK Ltd

    This paper explores frustrating issues encountered by DBAs when trying to implement Oracle database data protection. Discover how to navigate obstacles like recovery manager (RMAN) integration, recovery appliance implementation, and more.

  • How to Make Healthcare Data an Asset and Not a Burden

    Sponsored by: Dell EMC

    Discover a storage system that grows with the scale of your organization, converting data from archive to asset with scale-out network-attached storage (NAS). Read on to access 5 studies of diverse medical environments, illustrating the adaptability of NAS for healthcare institutions.

  • Integrated Security Technology & Management

    Sponsored by: Armor

    Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that designed with integrated security from the ground up.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • Endpoint Security vs. Enduser Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry Expert and AppSense CTO, Simon Townsend, will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Beyond Silos: Meeting the Healthcare Data Management Challenge

    Sponsored by: Dell EMC

    Reduce storage management complexities in your organization: Examine a scale-out NAS solution that will accommodate expanding data growth and optimize storage utilization. Read on to learn about the evolution of archiving and retention policies in healthcare, and more.

  • Your Guide to Trusted Backup and Recovery Software Solutions

    Sponsored by: IBM

    Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget

    Sponsored by: IBM

    Learn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.