Research Library

Powered by

Data Security White Papers

  • Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop

    Sponsored by: Hortonworks

    In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.

  • There's More to Backing Up VMs Than Meets the Eye

    Sponsored by: Veeam Software

    This whitepaper highlights a built-in infrastructure for application backups that can enable the full backups of virtual environments. Read on to see how this infrastructure, combined with Veeam's backup and recovery solutions, can provide your virtual environments with a wide array of backup, recovery, and replication functionalities.

  • Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration

    Sponsored by: LogicNow

    This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.

  • Maximize Performance and Data Availability for Virtualized Environments

    Sponsored by: Quantum Corporation

    This brief whitepaper highlights a backup and restoration software combined with a tiered storage infrastructure that allows the use of any combination of disk, cloud, or tape for data protection. Read on to see the benefits these technologies can provide to your enterprise, including maximized data availability, faster data recovery, and more.

  • Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability

    Sponsored by: Symantec Website Security

    In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.

  • Five Keys to Big Data Audit and Protection

    Sponsored by: Imperva

    Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.

  • 3 Steps to Implementing an Effective BYOD Mobile Security Strategy

    Sponsored by: Kingpin Communications

    This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.

  • The Top 4 Most Pressing Android Mobile Cybersecurity Threats

    Sponsored by: Kingpin Communications

    In this paper, you will break down the most common types of attacks that impact Android mobile devices. Read on to enact comprehensive protection against threats to Android, and prepare your mobile endpoints against mRATS, zero-day attacks, and more.

  • Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

    Sponsored by: Kingpin Communications

    This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.

  • Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection

    Sponsored by: Veeam Software

    This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.

  • How Mobile Malware Compromises Your Secure Containers and Enterprise Content

    Sponsored by: Kingpin Communications

    Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.

  • DataGravity and Continuous Sensitive Data Monitoring

    Sponsored by: DataGravity

    This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.

  • Checkpoint: Demystifying Mobile Security Attacks

    Sponsored by: Kingpin Communications

    In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause. Access this paper to arm yourself and identify how to best detect Android malware applications and rootkits, man-in-the-middle attacks, and more.

  • Data Management in the Modern World

    Sponsored by: DataGravity

    This white paper will help you get a handle on securing your data. It offers guidance and solutions to the vexing challenges of managing and protecting all of your organization's important information.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell

    This e-guide shows you the difference in security methods for virtual and physical desktops. Learn about different techniques and audiences each platform is catered to.

  • Gartner Market Guide for Data-Centric Audit and Protection

    Sponsored by: Imperva

    New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell

    This e-guide discusses ways cybercriminals successfully breach enterprise security and why VDI might be a better approach.

  • Breach Detection System: Detecting the Pros and Cons

    Sponsored by: Fortinet, Inc.

    In this report by NSS Labs, independent experts take a closer look at a breach detection system. Evaluate the strengths, weaknesses, opportunities, and threats of this network security approach to determine if it's the right step for your enterprise.

  • Sandbox Technology: Building an Effective Breach Detection and Response Strategy

    Sponsored by: Fortinet, Inc.

    This white paper highlights the use of sandboxes in conjunction with established security infrastructure for threat and data breach protection. Read on to learn the best practices for choosing a sandbox solution that will be successful in protecting your networks and infrastructures.

  • Backup is Broken

    Sponsored by: LogicNow

    This white paper discusses modern ways to backup up data, including a disk-to-disk-to-cloud (D2D2C) backup strategy. Read on to discover how to find the right architecture and vendor partner to help your enterprise deliver fast, secure, and reliable backup in a cloud-based environment.

  • 4 Business Continuity Best Practices Every MSP Should Follow

    Sponsored by: LogicNow

    This whitepaper highlights four business continuity and data backup best practices to help ensure reliable disaster recovery and minimal downtime. In addition, explore how employing a holistic business continuity strategy with virtual disaster recovery services can enable your enterprise to keep your data secure and improve your RTO.

  • Accelerating Big Data Collection and DataFlow Management

    Sponsored by: Hortonworks

    This white paper highlights a data management platform that combines data acquisition, simple event processing, and transport and delivery to accommodate highly diverse and complicated dataflow. Read on to see how this platform can enable your enterprise to simplify your big data ingest and increase security for collection and sharing of your data.

  • Data-Aware Storage: Introducing a New Era of Data Management

    Sponsored by: DataGravity

    This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.

  • Tips and Tricks for Leveraging NetApp Storage

    Sponsored by: Veeam Software

    This white paper discusses a backup & replication technology that can be integrated with NetApp storage platforms to reduce the RPO and RTO of your data operations. Read on for some expert tips and tricks to leverage this technology so that your enterprise can benefit from faster backups and simplified recovery.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.