ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection

    Sponsored by: Druva Software

    Your organization has evolved to keep up with a rapidly changing business landscape. It's time to renew your data protection strategy. This e-book explores the single, unified data protection platform was implemented in 3 different vertical industries and its impact on each organization.

  • The No-Compromise Safety Net for Mission-Critical Data in the Cloud

    Sponsored by: SoftNAS

    Access this e-book to learn about the technical aspects of what a NAS cloud for AWS can do for your organization's data center, how it provides the security your data requires, and more.

  • How Transactional Analytics is Enabling Digital Payments Transformation

    Sponsored by: Aerospike

    Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.

  • How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost

    Sponsored by: Wandera

    Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.

  • Manage & Secure Your Mobile Data Effectively

    Sponsored by: Wandera

    Mobile has been one of the most disruptive forces in business. Enterprises have been scrambling to get the right systems in place to equip employees with the best quality data plans and effectively manage that usage centrally. Learn how to tighten your mobile data security and data usage management.

  • Mobile Data Research Report

    Sponsored by: Wandera

    Mobile data continues to change and grow each year – and because of this frequency of change, it's important to know how your data may be affected. Learn about new mobile threats, compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage, and more.

  • Leading Media Provider Leverages Cloud Storage

    Sponsored by: SoftNAS

    In this case study, a leading media provider found that they were running out of storage space, but adding to their existing on-premise set up was only a temporary solution. Learn how they were able to move hundreds of terabytes of video content to and from a cloud-based environment.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Don't Rush into Cloud Databases without a Well-Grounded Plan

    Sponsored by: Data Intensity

    In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.

  • Rethinking Enterprise Data Management: A 360-Degree View

    Sponsored by: Veritas

    Download to discover a strategy for navigating the enterprise data management slalom with data backup and protection tools as the foundation. Learn more about this 360-degree approach here, which digs into unstructured data and executes intelligent decisions on how to treat each data type.

  • Cloud Data Management Tailor-Made For Your Business

    Sponsored by: Veritas

    74% of organizations have a multi-cloud strategy and 71% operate in a hybrid cloud model. As this trend continues to grow, data visibility, protection, and simplified cloud migration are all taking center stage. Access this infographic to learn about these 3 cloud data management focus areas and how to factor them into your cloud strategy.

  • Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

    Sponsored by: Dell EMC

    This white paper highlights must-have data security features deduplication should encompass. Access this resource now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: SearchSecurity.com

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Array Networks Secure Remote Access Case Study: City of Santa Barbara

    Sponsored by: Array Networks

    The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.

  • Dell EMC Global Data Protection Index: The Global Maturity of Data Protection

    Sponsored by: Dell EMC

    In this infographic, learn what 2,200 IT decision makers from 18 countries had to say about their backup and recovery experiences, strategies, and infrastructure. Access now to see where you stand in comparison.

  • Dell EMC Data Protection: Your choice is simple

    Sponsored by: Dell EMC

    This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more.

  • Integrated Cloud Storage Solutions for Modern Data Management

    Sponsored by: Commvault AWS

    Managing your data is one of the most important things you will do over the course of the next few years, especially as you put your big data strategies into action. Access this white paper to learn how to utilize cloud storage platforms to optimize your data management and find where the actionable insights are hiding.

  • Invisible Documents: A Serious Risk to Enterprise Content Management (ECM)

    Sponsored by: Microsoft

    Learn about invisible documents and how to tackle the challenge they represent with technologies like optical character recognition (OCR). Discover how to take enterprise content management (ECM) to the next level and remedy compliance issues before they can negatively impact your business.

  • Fourth Generation Data Leak Prevention

    Sponsored by: Ghangor Cloud

    In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.

  • Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation

    Sponsored by: MobileIron

    This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.

  • Empower Innovation with the Right Unified Collaboration Strategy

    Sponsored by: IBM

    Not only can effective collaboration tools better meet standards for enterprise security, but the business benefits are profound and well-documented. Discover integrated, cloud-based tools that can improve ROI, lower TCO, increase efficiency and user satisfaction, and more.

  • Data Protection Steps for Ransomware

    Sponsored by: TechTarget

    Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.

  • 4 Signs Your In-House Data Management is Untenable

    Sponsored by: Paramount Software Solutions

    Data management isn't exactly your organization's top priority, so there's a chance that you are overlooking some pain points. Access this white paper to learn 4 data management pain points to 2017 that will keep your data accessible and secure.

  • Jargon buster guide to GDPR

    Sponsored by: ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.