ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Armorblox for Data Privacy

    Sponsored by: Armorblox

    With employees sharing content over email, messaging apps, and cloud storage on a daily basis, Data Privacy is a major challenge for organizations. Armorblox can protect your organization against malicious or accidental data privacy breaches, and helps you avoid financial penalties and brand damage. Download this brief to learn more.

  • The Perimeter is Dead. Long Live the Perimeter

    Sponsored by: Symantec

    The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.

  • Cloud Security: Are You Ready?

    Sponsored by: Symantec

    Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.

  • Office 365 Business Case Builder

    Sponsored by: Symantec

    Office 365 is a broad and diverse platform that can present a complex security risk. In this resource, discover a 6-point business case builder to demonstrate how Symantec CloudSOC and Email Security.cloud can help provide protection for not just Office 365 but your wider cloud environment.

  • Don't Let Unexpected Storage Dependencies Put Your Business Continuity Plans at Risk!

    Sponsored by: DataCore Software Corporation

    Despite assumptions to the contrary, you don't have to waste time and money reinventing your BC/DR plan every time your storage infrastructure changes. Download this infographic for more information on how to preserve proven business continuity practices even as your storage infrastructure evolves.

  • The Ultimate User Experience Guide to Driving Business Growth & Security

    Sponsored by: Evident

    In this guide book, learn why exceptional user experience ensures you'll never have to choose between growth and security, and read practical user experience tips and best practices to help you know your customer with less friction and risk.

  • Data Security for the Way People Work

    Sponsored by: Dell EMC and Microsoft

    Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.

  • Identity Governance: The Great Enabler

    Sponsored by: SailPoint Technologies

    To understand how leading organizations are governing the digital identities of their employees and enhancing security in an age of rapid digital transformation, Forbes insights in association with SailPoint surveyed 200 senior technology executives at mid-market corporations. Download this report to explore highlights.

  • Prepare for When Disaster Strikes

    Sponsored by: Teradici

    This blog post covers 3 common disasters and how to combat them; read it here to ensure you can properly protect your organization if and when disaster strikes.

  • Taking Steps to Prevent Your BC/DR Plans from Being Derailed

    Sponsored by: DataCore Software Corporation

    The following white paper digs into how storage array replacement, mergers and acquisitions, cloud replication, multi-site metro clusters, and HCI could disrupt current BC/DR processes and how enterprises can use software-defined storage to fortify their BC/DR practices during these situations.

  • A Computer Weekly buyer's guide to data protection

    Sponsored by: ComputerWeekly.com

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

  • What Hackers Know That You Don't: Identity Assurance in the Digital Age

    Sponsored by: Evident

    Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. Attackers can combine info from now-infamous breaches with publicly available info to further compromise a user's identity to various ends. Download this white paper for practical tips to protect against hacks today.

  • How OneTrust Helps with the California Consumer Privacy Act (CCPA)

    Sponsored by: OneTrust

    The California Consumer Privacy Act (CCPA) will take effect on January 1, 2020. Organizations that conduct business in California now need a scalable way to discover what data they hold, how it is used, and what third parties have access to it. Learn how with OneTrust, your organization can take a holistic approach to CCPA compliance.

  • Deconstructing the Risk of Public Cloud: 5 Use Cases

    Sponsored by: Fortinet, Inc.

    Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.

  • Improve Your Relationship with Data

    Sponsored by: Virtru

    No matter where you are in your cloud journey, there's still time to improve your relationship with your data. Becoming familiar with your data and knowing all the places it resides is a great place to start. Discover how to improve your relationship with data by building a compliance readiness plan today.

  • Enterprise Governance, Risk, and Compliance for PeopleSoft

    Sponsored by: Appsian

    In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.

  • GDPR & PeopleSoft: Essentials for Compliance

    Sponsored by: Appsian

    Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.

  • Effective Data Management for NoSQL and Hadoop Environments

    Sponsored by: Cohesity

    The following ESG paper digs into the most important data protection and orchestration considerations for Hadoop and NoSQL deployments. Access now for more on the impact of Hadoop and NoSQL data loss and how to establish more flexible protection for these workloads in your organization.

  • Accelerate ERP Threat Detection

    Sponsored by: Appsian

    Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.

  • 5 Critical Mistakes When Evaluating a Next-Generation Firewall

    Sponsored by: Palo Alto Networks

    The firewall is the foundation of enterprise data security. All firewalls are not created equal, though, and no 2 organizations have the same needs, risks, and data flow. In this resource, explore 5 critical mistakes to avoid when evaluating a new next-generation firewall and selecting the perfect fit.

  • BrickStor Encryption & Key Management Capabilities

    Sponsored by: RackTop Systems

    Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.

  • Key Considerations for Compliance in the Cloud

    Sponsored by: Virtru

    Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.

  • The Simple Guide to Encryption Key Management

    Sponsored by: Virtru

    In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.

  • Safeguarding PeopleSoft Against Direct Deposit Theft

    Sponsored by: Appsian

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

  • Exposing PeopleSoft Self-Service Applications to the Internet

    Sponsored by: Appsian

    Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.