ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Inside Job: A Better Strategy to Stop Insider Threats

    Sponsored by: Infor

    Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.

  • Best Practices for Incorporating Cloud Services into a Comprehensive Backup and Recovery Strategy

    Sponsored by: Dell, Inc.

    Discover 9 best practices for incorporating a cloud service as part of a backup and recovery and throughout your entire IT processes. Also learn how to choose the right provider for your enterprise's data protection needs.

  • A Company Integrates its Infrastructure with Hadoop

    Sponsored by: Intel Corporation

    Learn about a company that needed a tool to extend its data integration architecture to incorporate big data in real time. Through improvements in ingestion, near-real-time consumption and more, the company was able to improve customer services, security, and data management.

  • From Data to Action: Your Guide to Analytics

    Sponsored by: Intel Corporation

    You've followed the big data trend and collected more data than you may need—now what? In this comprehensive guide to analytics, learn everything from using data to propel your business forward, to extracting value from almost any analytics project, to securing big data.

  • 85% of Customers are Dissatisfied with the Authentication Process

    Sponsored by: NICE Systems, Inc

    This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.

  • Manage risk by protecting apps, data and usage

    Sponsored by: Citrix

    This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • Blueprint for CIS Control Application: Securing the SAP Landscape

    Sponsored by: Onapsis

    Your organization should be thinking about how best to protect SAP systems. This paper teaches you how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.

  • Can Your DR Strategy Ensure Continuity in Quality Patient Care During a Disaster?

    Sponsored by: McKesson Corporation

    Explore the benefits of engaging a managed disaster recovery (DR) services expert when it comes to your health care organization's data protection and recovery strategy. Your organization can reduce the burden on your IT staff with a disaster recovery service that meets all your patient data protection and recovery needs.

  • Best Practices for Healthcare IT Disaster Recovery in the New Threat Landscape

    Sponsored by: McKesson Corporation

    Explore expert best practices for implementing a reliable and effective disaster recovery and business continuity strategy in a healthcare organization. Also discover how a DR service provider can provide you with the knowledge necessary to ensure critical patient data and systems are safe and accessible.

  • Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

    Sponsored by: IBM

    The Endpoint Security Maturity Model provides helpful guidance for developing a long-term strategy for endpoint management. Read some of the results from the SANS 2016 Endpoint Security Survey to learn how organizations are dealing with the changing endpoint landscape and where they fall short.

  • Day in the Life of a Security Admin

    Sponsored by: RSA Softcat

    Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.

  • Onapsis Research Labs: SAP Systems Security Analysis

    Sponsored by: Onapsis

    This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: Hewlett Packard Enterprise

    For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.

  • Transform your "Good Backup" to Efficient App Availability And Recovery

    Sponsored by: Dell, Inc.

    Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.

  • Removing the Risk from Compliance in the Cloud

    Sponsored by: VMware

    Within this white paper, learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.

  • Ease Backup Woes with Cost-Efficient Data Archiving

    Sponsored by: Rubrik

    George Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.

  • You May Need Additional Backup to Prevent Data Loss From Your SaaS Solutions

    Sponsored by: Druva Software

    Gartner's latest research results compare and contrast the pros and cons of SaaS solutions for backup/recovery. Find out why SaaS may (or may not) fall short in preventing data loss as Gartner reviews Google Apps v. Microsoft Office 365 v. Salesforce.

  • Is Your MFT Ready for Digital?

    Sponsored by: Axway

    The data universe is expanding and cyberattacks are increasing. As more businesses go increasingly digital, file sharing grows in importance. Explore what it means to securely go digital and prepare your managed file transfer platform to do the same.

  • Digital Business: Managed File Transfer Solutions

    Sponsored by: Axway

    Discover a managed file transfer platform that bolsters your security during file transfer. Learn how to improve file sharing security by enabling central governance, limiting access to certain defined users, and more.

  • Information Security and Data Privacy Practices

    Sponsored by: Gigya

    Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • Use These Five Backup and Recovery Best Practices to Protect Against Ransomware

    Sponsored by: Druva Software

    Expert analysts reveal the top five backup and recovery best practices that enable you to defend against ransomware. Learn why your data is vulnerable to these attacks and how to repel them before you or your organization fall prey to attack.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • Application Defense In Depth

    Sponsored by: IMMUNIO, Inc.

    The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.