ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Driving in the Data Security Fast Lane: Secureworks Puts McLaren in Pole Position

    Sponsored by: Dell SecureWorks

    In motorsport, there are huge quantities of data being processed by engineers in the pit. Keeping this information secure and available when needed is essential. In this case study, learn how McLaren was able keep their data secure by deploying Securework's full cybersecurity platform across the organization to assess threats in real time.

  • Third-Party Cyber-Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices

    Sponsored by: BitSight

    Today's complex business world means that organizations need to work with third parties. While this is critical, the exchange of sensitive information creates a new set of security risks. In this research report, explore key findings from a survey aimed to assess how financial institutions are responding to third-party cyber-risk.

  • Halton Borough Council Supports Vulnerable Citizens with Veeam Intelligent Data Management

    Sponsored by: Veeam Software

    The challenge of ensuring exponentially increasing volumes of data are properly backed up is one which many enterprises can appreciate. To discover how Halton Borough Council ultimately achieved reliable, GDPR-compliant backups without draining vital resources, access the study now.

  • 2018 Payment Security Report

    Sponsored by: Verizon

    Verizon published its report on payment card security and compliance with the PCI DSS. Download the report now for a deep-dive into the specifics of what organizations find challenging about PCI DSS, the lessons learned from decades of dealing with compliance, and how to build a more sustainable security environment.

  • Are You Ready for the Future of Disaster Recovery and Business Continuity Planning?

    Sponsored by: Involta

    This white paper will help as you review your company's disaster recovery and business continuity plan (DR/BCP). Read on for 5 critical considerations as you revisit your DR plan, how to prepare for several different disaster scenarios, and more.

  • Protect Your Business from the Unexpected

    Sponsored by: Involta

    To ensure you can recover quickly in the event of an outage, check out this infographic. It identifies the most common causes of downtime, explains how DRaaS offers one means of improving DR resiliency, and details 5 DRaaS benefits.

  • 8 Essential Elements of a Comprehensive IT Security Strategy

    Sponsored by: Involta

    IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.

  • Combining Modern HCI with Complete Data Protection

    Sponsored by: Commvault

    Guest speaker from Forrester Research Naveen Chhabra, Senior Director of Product Management at Cisco Vijay Venugopal, and Director of Product Management at Commvault Jonathan Howard discuss the challenges of establishing comprehensive data protection and DR in hyper-converged environments in this webcast.

  • Is Your Cybersecurity Strategy In Good Shape?

    Sponsored by: Iron Mountain

    This white paper will help you tackle these evolving threats and secure your business with a proven 3-stage data protection process. View it now to get started and to ensure your cybersecurity strategy is in good shape.

  • Smarter Data Protection with Machine Learning

    Sponsored by: TITUS

    Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.

  • TITUS Intelligent Protection

    Sponsored by: TITUS

    TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.

  • Access & Protect Your Data – Anywhere, Anytime

    Sponsored by: TITUS

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

  • The State of the CASB Market

    Sponsored by: Forcepoint

    With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.

  • TITUS Military Classification Tool

    Sponsored by: TITUS

    In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.

  • TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification

    Sponsored by: TITUS

    One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.

  • Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell EMC

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • Combining Modern HCI with Complete Data Protection

    Sponsored by: Commvault Cisco Forrester

    Guest speaker from Forrester Research Naveen Chhabra, Senior Director of Product Management at Cisco Vijay Venugopal, and Director of Product Management at Commvault Jonathan Howard discuss the challenges of establishing comprehensive data protection and DR in hyper-converged environments in this webcast.

  • California Consumer Privacy Act and the Role of IAM

    Sponsored by: WSO2, Inc.

    Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.

  • Can You Handle Your Data?

    Sponsored by: TITUS

    The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.

  • Cloud Access Security Broker- Market Quadrant 2018

    Sponsored by: Forcepoint

    Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.

  • Drive Digital Transformation with a Unified Data Management Approach

    Sponsored by: Softchoice

    Download this paper to discover a 360-degree approach for visualizing, protecting, accessing, and migrating all of your data—even across the multi-cloud. You'll view 6 key capabilities and learn how your organization can benefit from a similar approach.

  • Enterprise Data Protection: A Four-Step Plan

    Sponsored by: Veritas

    What goes into an enterprise-wide data protection (DP) plan? More than you think. This interactive buyers' guide and checklist provides you with a four-step approach to ensuring all workloads—whether on-premises or in the cloud—are protected efficiently.

  • Top 5 Critical Alerts You Need for IT Security

    Sponsored by: ManageEngine

    Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: comForte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Enterprise Data Protection Special Edition E-book

    Sponsored by: Veritas

    Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition, is an overview of the issues faced by data protection teams and how to solve these problems. Get your complimentary copy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.