ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud

    Sponsored by: Trend Micro

    SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.

  • Webinar: You Need Live Patching to Achieve SOC2 Compliance

    Sponsored by: CloudLinux

    In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.

  • Zero Trust Access Helps UK County Improve Productivity and Access Control

    Sponsored by: PortSys

    The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.

  • Interview with Identity Expert

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.

  • Commvault Provides Native Access to Amazon S3 Including Amazon Glacier and Deep Archive

    Sponsored by: Commvault

    Choosing a data management solution that compliments your backup and recovery needs and investments means simpler, streamlined data protection. Read this webcast to learn about a complete data backup solution that uses a single interface to unify protection for on-premises and public cloud environments and offers auditing, reporting, and alerting.

  • Security Governance: Building a Framework and Establishing Trust

    Sponsored by: RSA Conference

    Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.

  • The 5 Most Dangerous New Attack Techniques: Are They Evolving?

    Sponsored by: RSA Conference

    Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.

  • Threats of Surveillance Tools: Spyware and Stalkerware

    Sponsored by: RSA Conference

    Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.

  • Understanding Recovery Readiness in a Not-So-Ready World.

    Sponsored by: Commvault

    Modern recovery doesn’t come without its challenges, which is where having a recovery readiness strategy comes into play. Watch this webcast to learn the 3 essential elements of recovery readiness and to see how AI and ML are changing the backup landscape.

  • Cloud Disaster Recovery: A Survival Guide by the University of Canberra

    Sponsored by: Commvault

    By choosing a DR solution that automatically uploaded data daily and secured it for long-term retention, the University of Canberra could be sure that their data was safe in the event of a disaster. Watch this webcast to learn more about the solution that Canberra chose and the 5 transformational benefits it created.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • ThreatQ for Critical Infrastructure

    Sponsored by: ThreatQuotient

    Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • University of Canberra saves A 135,000 by eliminating tapes with AWS and Commvault

    Sponsored by: Commvault

    By implementing a holistic solution that supported the cloud service providers they wanted to use, UC was able to reduce storage overhead by A$135,000 and improve their back up window by 38%. Read this case study to discover the solution UC put in place to transform their storage and to hear the remaining benefits they experienced.

  • ThreatQ for Healthcare

    Sponsored by: ThreatQuotient

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

  • Ransomware - Protect Your Data

    Sponsored by: Commvault

    One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.

  • Data governance more important now than ever

    Sponsored by: ComputerWeekly.com

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

  • Cost Efficient Backups for the Enterprise

    Sponsored by: Druva

    Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.

  • Data Housekeeping Checklist

    Sponsored by: IBM

    Download this 17-point data housekeeping checklist to prep your organization for putting AI and ML technologies to work and to ensure that, in both training and inference, your systems and admins are prepared to handle these intensive workloads.

  • Gain Situational Awareness to Improve Critical Event Management

    Sponsored by: EverBridge Inc.

    Access this white paper to learn several techniques to improve your organization’s critical event management (CEM) like the OODA loop, data collection, and the 4 steps to resolving crises.

  • 9 Steps to Critical Event Management Improvement

    Sponsored by: EverBridge Inc.

    By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.

  • Why Data Capture and Automation Are Key to Digital Transformation

    Sponsored by: IBM

    Access this e-book to learn the 5 ways data capture and automation are changing the way we process information today and the 3 crucial components to consider when weighing data capture solutions.

  • ZeroNorth 2019 End of Year Report

    Sponsored by: ZeroNorth

    2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.

  • Fraud Detection in Healthcare: a step-by-step guide to incorporating machine learning

    Sponsored by: Dataiku

    There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.

  • Enterprise Family Guide

    Sponsored by: TechData - Seagate

    Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.