Research Library

Powered by

Data Security White Papers

  • Navigate The Future Of Identity And Access Management

    Sponsored by: Covisint

    In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.

  • Cloud Backup is not "One Size Fits All" - Five Factors for Consideration

    Sponsored by: Dimension Data

    This beneficial document discusses five areas that IT directors should closely examine to determine which cloud backup approach will best fit their specific requirements. Read on to see the specific questions you should poise to cloud service providers to help you leverage the technology to fit your data needs.

  • Protecting Your Data in the Cloud: A Multilayered Approach to SaaS Security

    Sponsored by: Workforce Software

    In this white paper, learn about a multi-layered software-as-a-service security option that keeps sensitive cloud HR information safe. Explore the various layers of security this option offers, including physical safeguards, technical safeguards, and more.

  • Information Governance: People, Process & Technology

    Sponsored by: DLT Solutions

    This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.

  • State of File Collaboration Security

    Sponsored by: FinalCode

    Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.

  • The Essential Executive Starter Guide to Microsoft Azure

    Sponsored by: Softchoice Corporation

    Access this essential guide to examine five steps necessary to ensure a successful move to Microsoft Azure. Inside you'll discover best practices, tips, and industry examples of how to deploy Microsoft Azure and learn key obstacles organizations face in delivering Azure and how to overcome them.

  • Old PCs Put Your Business at Risk

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.

  • The Essential Guide to Microsoft Azure Security

    Sponsored by: Softchoice Corporation

    Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.

  • Case Study - Global Financial Services Provider 60 TB PST Migration

    Sponsored by: QUADROtech

    This case study chronicles how one company made the decision to eliminate PST files through migration, and how compliance played a part in this decision. Read on to learn how this company was able to quickly and easily archive 67,000 files.

  • Bridging the Information Governance Gap

    Sponsored by: Recall Corporation

    Access this resource to learn how user-friendly, collaborative, and powerful processes that create an automated, enterprise-wide information governance environment may mean that your organization will soon be able to control your data, instead of data controlling you.

  • Web application firewall provides continuous web app protection

    Sponsored by: Trustwave

    Access this white paper to learn about a web application firewall appliance that provides real-time, continuous security against attacks and data loss and assures that your web applications operate as intended and are compliant with industry regulations and discover how you can protect against the loss of sensitive information.

  • 2015 Electronic Communications Compliance Survey Report

    Sponsored by: Smarsh

    This 5th annual Electronic Communications Compliance Survey Report explores the current landscape of compliance and the emerging risks/threats.

  • Breaking Down the Main Barriers to Cloud Backup

    Sponsored by: Dimension Data

    Access this white paper to learn about the barriers that IT leaders have to overcome when considering the management of data backup within cloud storage. Read on to see what your enterprise should take into account if you are considering cloud for your data management.

  • The State Of Endpoint Security Adoption 2014 To 2015

    Sponsored by: Dell, Inc. and Intel®

    In this special report, Forrester presents the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.

  • 3 Essential Components for a Strong End User Security Strategy

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.

  • WAF Enables Cloud and Hosting Providers to Bolster Security Offerings

    Sponsored by: Radware

    In this white paper, explore how cloud and hosting providers can improve security to attract more customers, improve per-customer revenue, and increase loyalty. Continue reading to learn the top 3 web app security challenges and how to put customers' minds at ease.

  • The Role of Third-Party Tools for Office 365 Compliance

    Sponsored by: Smarsh

    This white paper explores the challenges of keeping Office 365 in regulatory compliance for your enterprise. Access now to see how you can keep your enterprise up on all of your auditing and reporting requirements.

  • Case Study: Securing Files Anywhere in the World

    Sponsored by: FinalCode

    By using a case study of one successful corporation, this white paper examines what you can do to maintain the confidentiality of all your files, no matter who has access to them.

  • The Cloud App Visibility Blind Spot

    Sponsored by: Imperva

    This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of "Shadow IT". In addition, this paper covers why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.

  • Top 10 Database Security Threats

    Sponsored by: Imperva

    Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.

  • DLP Benefits for Enterprises and Intellectual Property Protection

    Sponsored by: Digital Guardian

    This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.

  • Sizing The Cloud Security Market

    Sponsored by: HyTrust

    This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.

  • Quantifying the Business Value of Dell XC Powered by Nutanix Software

    Sponsored by: Dell, Inc.

    This white paper details the business value of pairing hyper-converged infrastructure with next-gen backup software can dramatically increase efficiency and bolster data protection. Read on to learn about how you can deploy storage systems faster, reduce unplanned downtime, and more.

  • Key Considerations in Choosing a Web Application Firewall

    Sponsored by: F5 Networks

    Access this white paper to learn how web application firewalls (WAF) have changed due to the rise of the cloud and uncover the key factors you should consider when selecting a WAF to protect your business – including basic and advanced considerations.

  • Email Archive Migration: Opportunities and Risks

    Sponsored by: QUADROtech

    This informative white paper discusses important issues associated with drivers for archive migration and how to manage these migrations properly. Read on to see how your enterprise can benefit from the use of a new archiving platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.