ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Ensure Data Protection with Fidelis Network

    Sponsored by: Fidelis

    To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.

  • Australian Organizations Know They Should Be More Cyber Resilient

    Sponsored by: Mimecast

    If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.

  • Holistic Data Protection Resource Center

    Sponsored by: Commvault

    This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.

  • Holistic Data Protection Custom Web Site

    Sponsored by: Commvault

    This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.

  • Holistic Data Protection Center

    Sponsored by: Commvault

    This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.

  • How CIOs are Achieving Compliance Using Encryption Management in the New Regulatory Era

    Sponsored by: WinMagic

    Download this resource for a look at a CXO briefing with a 'how to' guide for a simplified approach to compliance with encryption management.

  • Making BitLocker Simple, Smart and Secure for You

    Sponsored by: WinMagic

    Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.

  • Security Think Tank: Data Protection vs. Data Loss Prevention

    Sponsored by: Docauthority

    Why is it important to know where data flows, with whom it's shared and where it lives at rest? Discover why your organization could benefit from focusing on data protection, without relying on data loss prevention alone.

  • Leading Legal Firm Implements the Fidelis Platform to Protect Clients From Advanced Attacks

    Sponsored by: Fidelis

    Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.

  • 2018 Security Implications of Digital Transformation Report

    Sponsored by: Fortinet, Inc.

    While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Digital Forensics And Incident Response Service Providers

    Sponsored by: BCM One - Verizon

    This Forrester report compares 14 of the most significant digital forensics incident response service providers and helps security and risk professionals make the right choice.

  • Extreme Protection That Eliminates Data Loss for All of Your Oracle Databases

    Sponsored by: Oracle Corporation UK Ltd

    Get an in-depth look at the key advantages and organizational benefits of Oracle's Zero Data Loss Recovery Appliance to avoid loss of sensitive data, today.

  • Comprehensive E-book for Database Protection

    Sponsored by: Oracle Corporation UK Ltd

    The following e-book illustrates the intricacies associated with database backup and recovery, containing 4 chapters on architecting the optimal recovery solution, how to protect Oracle Databases specifically, and more. Click to download your copy.

  • 2018 Data Breach Investigations Report

    Sponsored by: BCM One - Verizon

    78% of breaches feature either hacking or malware, according to Verizon's 2018 report that analyzed over 2,000 data breaches and 53,000 incidents. Download this full report for more information on changing trends among hacking vs. malware attacks.

  • SOC-as-a-Service in Action

    Sponsored by: Arctic Wolf

    As a global provider of technical support and help desk services, Trusource Labs' database contained personally identifiable information for tens of thousands of individuals. Simply put, Trusource could not risk being hacked. Explore how Trusource benefitted by turning to a security operations center (SOC)-as-a-service.

  • Protecting Your Digital Enterprise

    Sponsored by: Oracle Corporation UK Ltd

    An area of concern for security is the care given to data recoverability. Purpose-built storage and strategies can help resolve data recoverability woes. Download this white paper to discover 5 enterprise security strategies for companies exposed to multiple business risks.

  • Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service

    Sponsored by: Arctic Wolf

    Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.

  • GDPR: 5 Lessons Learned Veeam Compliance Experience Shared

    Sponsored by: Veeam Software

    GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.

  • How to Reduce Your Organization's Digital Attack Surface & Cyber Risk

    Sponsored by: IntSights

    Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.

  • 3 Customer Profiles for Modern Data Management

    Sponsored by: Imanis Data

    As a result of a single developer error, a Fortune 10 company lost 400TB in their multi-petabyte Hadoop environment. Discover 3 customer stories and see how a data management platform helped save money and manage data.

  • Advanced Data Protection Now Within Reach for Mid-Market Companies

    Sponsored by: InteliSecure

    Robust security programs are more accessible, affordable, and capable than ever before, helping confront a deluge of new regulations and cyber threats for mid-market companies, today. Download this white paper to see the real benefits of Managed Security Services.

  • The 6 Business and Security Benefits of Zero Trust

    Sponsored by: Akamai Technologies

    Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.

  • Quantifying Business Risk to Optimize Data Security

    Sponsored by: InteliSecure

    Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.

  • Hyper-converged Secondary Storage: More Than Just a Trend

    Sponsored by: Cohesity

    This guide delves into Cohesity's hyper-converged secondary storage platform, and explains why this new category of backup offerings is more than just a trend. Read on for the exclusive details, including an article illustrating how Cohesity's scale-out system replaced legacy EMC at Piedmont HealthCare in North Carolina.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.