ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Enhancing the Modern Workplace with Hardware-Enforced Security

    Sponsored by: Servium

    An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • Tried and Tested: The New Paradigm in the Workplace

    Sponsored by: NTT

    The COVID-19 lockdown has forced the acceleration of companies' digital transformation agendas, with important advancements in employee engagement, productivity and security. In this IDC report, learn more about how the new paradigm or work is transforming the workplace, workforce and work culture.

  • When Everything is Closed, Keep Your Business Open with Remote Access

    Sponsored by: Aruba Networks

    When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.

  • Cybersecurity and Education: The State of the Digital District in 2020

    Sponsored by: Absolute Software Corporation

    K-12 schools are rapidly embracing technology to augment current curriculums by enabling innovative learning paths for students in the event they can’t be in the classroom. This report provides an overview of the key risks, trends and recommendations from Absolute’s recent study into the state of digital education.

  • Making Apache Spark Better with Delta Lake

    Sponsored by: DataBricks

    For data engineers, building fast, reliable pipelines is only the beginning. Today, you also need to deliver clean, high quality data ready for downstream users to perform BI and ML. Read on to learn how the best big data engines like Apache Spark can be improved with the addition of the Delta Lake.

  • Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences

    Sponsored by: DivvyCloud

    In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.

  • The Cost of a Data Breach in Healthcare: Settlements Involving Lost or Stolen Devices

    Sponsored by: Absolute Software Corporation

    Protected Health Information (PHI) has quickly become the most attractive target for cybercriminals – especially full patient dossiers that include driver’s licenses, health insurance information and other sensitive data. Download this white paper for a look at specific data breaches and discover a set of key trends and lessons learned.

  • Privileged Access Cloud Security For Dummies

    Sponsored by: Thycotic

    Cloud breaches have increased to 24% of all breaches per the 2020 Verizon Data Breach Investigations Report. 77% of these breaches involved compromised user credentials. Enter privileged access management (PAM). Understanding PAM is essential in giving users easy, secure cloud access, and so browsing this e-book may be beneficial.

  • Threat Intelligence: Shrinking the Cybersecurity Data Gap

    Sponsored by: Bitdefender

    The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.

  • Cloud Architect’s Guide to Office 365 Backup

    Sponsored by: Druva

    Access this white paper to learn what Microsoft recommends in their SLA for securing Office 365, why you need to protect your Office 365 data, and the 6 advantages of doing it with Druva.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive

    Sponsored by: Lookout

    IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.

  • Dynamic Data Protection

    Sponsored by: Forcepoint

    The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.

  • Securing Your Data Stored in OneDrive: SailPoint Demo

    Sponsored by: SailPoint Technologies

    In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.

  • How to Detect The 7 Types of Document and Identity Fraud

    Sponsored by: Onfido

    Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.

  • Cloud Pak for Data Podcast Series

    Sponsored by: IBM

    Join the podcast to hear the latest news on IBM’s leading data and AI platform, IBM Cloud Pak for Data. As IBM celebrates the platform’s 2 years in market, hear from their Chief Product Officer, Dinesh Nirmal, and their Forrester guest on the benefits of this unified data and AI platform and its partnership with Red Hat OpenShift.

  • Leading healthcare provider protects vital client assets with help from Thales

    Sponsored by: Thales

    This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.

  • Enterprise Data Protection Solutions, Explained

    Sponsored by: Forcepoint

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

  • The Definitive Guide to Data Protection

    Sponsored by: Forcepoint

    It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.

  • Frost & Sullivan Best Practices Award

    Sponsored by: Onfido

    The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.

  • Protecting Workloads and Hybrid in Multi-Cloud Environments

    Sponsored by: Guardicore

    Businesses may be moving to the cloud, but with 98% of enterprises running on-premise servers, data centers aren’t going anywhere. A hybrid cloud model uses both on-prem data centers and a public cloud to optimize functionality. Read this white paper for information on how to keep these dual-workloads secure.

  • 9 Steps to Success with Data Protection

    Sponsored by: Forcepoint

    Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.

  • Eliminating the Weakest Link

    Sponsored by: Iron Mountain

    Access this webcast to hear two solution experts from Iron Mountain discuss the backup challenges associated with working remote, the new business continuity landscape, where organizational priorities should lie, and the future for remote workforces.

  • Why Companies Move to the Cloud: 8 Success Stories

    Sponsored by: Talend

    Businesses want to migrate to the cloud for a variety of reasons: storage scalability, data integration, flexibility. When you have a data management suite that can do it all, the process of cloud migration suddenly becomes easier. Check out these 8 cloud migration success stories to learn why companies choose Talend when moving to the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.