Research Library

Powered by

Data Security Research

  • Continuous replication for mission-critical systems

    Sponsored by: Dell Technologies and VMware

    Rushmore Electric Power Cooperative’s old backup solution left 50% of their data unprotected and exceeded their 13-hour backup window, sometimes by days. To improve user experience, they wanted faster, comprehensive data protection. Read this case study to learn how they addressed these challenges.

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    Sponsored by:

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

  • Public Sector Guide: How to Remove IT from Public Records Requests

    Sponsored by: Smarsh

    Government agencies are under increasing pressure to be more transparent when it comes to personal information – requiring them to maintain strong data integrity and respond quickly to public records requests. Access this guide to unlock valuable insight and practical tips to streamline your public records request process.

  • Spotlight on Emerging Ransomware Threats

    Sponsored by: Commvault

    Giving into ransom demands may not only lead to more ransomware attacks, but also more sophisticated ones. Paying those demands has the potential to create a false sense of security, unintended consequences and future liabilities. Tap into this e-guide to learn about current & emerging threats, best practices, and the negation process.

  • Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap

    Sponsored by:

    In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.

  • Trustworthy AI Predict and automate outcomes with trusted AI

    Sponsored by: IBM

    Businesses are increasingly looking to automate AI to help them become more intelligent, resilient and flexible. Access your guide to the best strategic approaches to data and AI by completing this brief survey.

  • Challenging the Rules of Data Security

    Sponsored by: Dell Technologies and Google


  • Improve IT Security and Compliance with Mainframe Data in Splunk

    Sponsored by: Precisely

    If your organization uses Splunk, you can’t afford to leave out your mainframes and view them through a wider lens in order to find and address security blind spots. Watch this webinar to learn more about improving IT security, visibility and compliance with mainframe data in Splunk.


    Sponsored by: Comforte AG

    Data is protection is the most important part of any modern cybersecurity and compliance strategy. Access this solution brief to learn how Comforte AG is helping organization protect their most critical and sensitive data.

  • Data Access Governance - Supercharged With AI

    Sponsored by: Concentric

    Data access governance is the relatively straightforward task of making sure that only the people who need to access sensitive business information can do so. Watch this video to learn more about the importance of data access governance and discover how you can identify, monitor, and protect sensitive business data with greater ease.

  • Digital Transformation...or Data Exasperation?

    Sponsored by: Concentric

    By aligning data governance with business outcomes and your company’s data culture, you can ensure you’re facilitating proper data access even as you secure critical data. Watch this webinar to learn how data discovery, governance, and protection can be augmented with tools like AI, allowing you to protect your data as you drive greater value.

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    Sponsored by:

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by:

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • Concentric AI Video Datasheet

    Sponsored by: Concentric

    Watch this short video to learn how Concentric’s Semantic Intelligence solution can help you better identify and secure unstructured data, whether it takes the form of a report, financial documents, spreadsheet, or something else.

  • Semantic Intelligence™ Solution with Risk Distance™ Analysis

    Sponsored by: Concentric

    Semantic Intelligence allows you to deploy deep learning solutions capable of discovering, categorizing, and securing both structured and unstructured data. Access this white paper to learn how Concentric Semantic Intelligence works across hybrid cloud environments in a variety of use cases to ensure data compliance and protection.

  • Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?

    Sponsored by:

    In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.

  • Data Security Platform Solution Brief

    Sponsored by: Comforte AG

    With Comforte SecurDPS platform, your organization can gain a unique and powerful perspective for planning privacy compliance, implementing cloud migrations, and then measuring your breach risks in a quantitative manner. Access this solution brief to learn more about the benefits of Comforte SecurDPS platform.

  • Let's Talk About Data Security for Cloud & PII

    Sponsored by: Comforte AG

    Comforte's data security platform secures all your sensitive data and information intended for applications using standard protocols, especially useful for aaS applications. Access this PDF to learn more about data-centric security and the benefits of Comforte's data security platform.

  • Risk-Adaptive Data Protection Webcast

    Sponsored by: Forcepoint

    Learn how Risk-Based DLP balances employee productivity with providing effective breach protection.

  • Risk-Adaptive Data Protection: The behavior-based approach

    Sponsored by: Forcepoint

    Learn how Risk-Adaptive DLP goes beyond traditional solutions to meet the needs of your expanded ecosystem.

  • Privacy, Security, and GDPR in Atlassian Cloud

    Sponsored by: Atlassian

    Join leaders across Atlassian in security and compliance as they walk through the security and privacy of Atlassian’s cloud products and how to stay compliant.

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    Sponsored by:

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

  • Computer Weekly - 25 May 2021: Making data an asset, not a threat

    Sponsored by:

    In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.

  • Zero-trust Implementation Begins With Choosing an On-Ramp

    Sponsored by: Thales


  • CPRA Compliance Creates Complications for IT Ops

    Sponsored by: Thales


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences