ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • 6 Best Practices for Securing AWS Environments

    Sponsored by: Centrify Corporation

    Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.

  • The Impact of Data Breaches on Reputation and Share Value

    Sponsored by: Centrify Corporation

    Discover how IT practitioners, marketers, and consumers view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.

  • 6 Best Practices: Privileged Access Security for AWS

    Sponsored by: Centrify Corporation

    This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.

  • Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model

    Sponsored by: Centrify Corporation

    Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.

  • What’s New in MySQL 5.7

    Sponsored by: Oracle Corporation

    Oracle's MySQL 5.7 offers a secure, scalable way to manage data. Learn more about the performance and security improvements in this iteration of MySQL in the following white paper.

  • Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value

    Sponsored by: Rubrik

    Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.

  • Fast Track Containers to Production

    Sponsored by: Diamanti

    Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.

  • What GDPR Means for Your Security Strategy

    Sponsored by: Dell SecureWorks

    Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.

  • Big Pharma, Healthcare, Biotech & Life Sciences: How Are These Industries Handling Big Data?

    Sponsored by: Unisys

    According to new research, 215 executives and IT professionals in the pharmaceutical industry reveal that big data has become a key priority. But organizations must take time to fulfill the potential of large data sets and ensure cyber security. Uncover how big pharma is using big data, and how they're overcoming associated challenges.

  • Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

    Sponsored by: Gigamon

    Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.

  • Sungard AS Data Protection Customer Case Study

    Sponsored by: Dell EMC and Intel®

    Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.

  • Top 10 Reasons Why Dell EMC Data Domain is the Industry Leading Protection Storage

    Sponsored by: Dell EMC and Intel®

    Dell EMC Data Domain is one of the industry's leading data protection and storage platforms, but what are the factors that truly differentiate it from the other options on the market? Uncover 10 reasons why Data Domain is standout protection storage.

  • Top Reasons to Choose Dell EMC Data Protection Over HPE

    Sponsored by: Dell EMC and Intel®

    Find out how to achieve truly scalable, cost-effective data protection and backup. Plus, discover 8 reasons to consider Dell EMC data protection when building your strategy for securing data in cloud and virtual environments.

  • 10 Tips for Selecting a Digital Signature System

    Sponsored by: Microsoft

    This white paper explores how to incorporate an e-signature system into your digital document management strategies. Uncover 10 questions to ask when selecting a digital signature tool.

  • Analyzing the Malware Threat

    Sponsored by: Symantec & Blue Coat Systems

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • Information Protection in the Web and Cloud Era

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.

  • Compliance: The 'Privacy By Design' Approach To Secure Personal Data

    Sponsored by: Symantec & Blue Coat Systems

    Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.

  • A Computer Weekly Buyer's Guide to EU General Data Protection

    Sponsored by: ComputerWeekly.com

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

  • Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

  • 4 Pillars Behind The Evolution Of End-User Computing

    Sponsored by: VMware

    Download this white paper to discover a simple and secure enterprise platform that delivers and manages any app on any device. By integrating identity management, real-time application delivery, and EMM, the platform engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the mobile-cloud era.

  • IoT in Retail: Engaging the Connected Customer

    Sponsored by: SAS

    Discover how retailers can optimize their management of IoT data to anticipate customer needs and engage them where they choose to connect – mobile, in-store, or online. Find out how to update your analytics strategy to handle IoT volumes in order to generate insights that empower you to keep up with connected customers.

  • Securing and Illuminating the Pharmaceutical Supply Chain

    Sponsored by: Unisys

    Lack of transparency in the supply chain means a lot of pharmaceutical companies are delivering meds that could be damaged or counterfeit. Learn how one vendor is taking steps to secure and illuminate the entire pharmaceutical supply chain by identifying authentication issues.

  • Universal Storage for Data Lakes: An ESG Evaluation

    Sponsored by: Dell EMC and Intel®

    This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.

  • Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns

    Sponsored by: HGST

    This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.