ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Angelo State University Simplifies Refresh Cycles With Druva inSync

    Sponsored by: Druva Software

    Find out this university was able to simplify its refresh process, maintain continuous data protection, and reduce data restore and backup times by 75%.

  • How to Achieve Breakthrough BC/DR While Controlling Costs and Complexity

    Sponsored by: Pure Storage

    This custom white paper outlines a new active/active stretched cluster technology with transparent failover that allows companies of all sizes to achieve the highest levels of business continuity. Designed to work with all-flash arrays, read on for the complete description of its features.

  • Overview: Iron Cloud from Iron Mountain

    Sponsored by: Iron Mountain

    Iron Mountain is now foraying into the cloud space with their data management platform Iron Cloud. Just what exactly is Iron Cloud, and what does it offer in terms of backup, archiving, and data migration services? Read on to find out.

  • Solution Overview: Iron Cloud Critical Protection and Recovery

    Sponsored by: Iron Mountain

    This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.

  • Data Restoration Program

    Sponsored by: Iron Mountain

    This resource highlights a data restoration program that removes the operational headaches and costly management of tape backup systems from your plate. If you want to reduce the cost of tape operations, know for certain what data your tape backups are storing, and gain the ability to quickly retrieve data, read on.

  • Are You Ready for the Inevitable? Be Prepared for Ransomware

    Sponsored by: Iron Mountain

    What options are at your disposal for protecting critical data in the event of a ransomware attack? This infographic discloses one such option, which can isolate your company's most valuable IP/mission-critical data sets from the network. Download here to distance your data from the threat of ransomware.

  • Discovering Modern Data Management

    Sponsored by: Imanis Data

    It's not a stretch to say that data is the true lifeblood of an enterprise and organizations depend on it. In this white paper, discover the 4 pillars of data management as well as an introduction to Imanis Data, including core capabilities, security intelligence and more.

  • CW ASEAN: Unlock flash opportunities

    Sponsored by: ComputerWeekly.com

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

  • Introducing ThreatConnect's Intel Report Cards

    Sponsored by: ThreatConnect

    Learn about the report card feature and metrics, and how you can use insights into how certain feeds are performing within your threat intelligence platform to make better decisions throughout your security lifecycle.

  • The Power and Responsibility of Customer Data and Analytics

    Sponsored by: ThreatConnect

    Learn how ThreatConnect uses customer data and analytics can help your organization avoid future compromises in trust and enhance data security.

  • Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World

    Sponsored by: Smarsh

    Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.

  • Bank Achieves $5 Million in Annual Savings Through Data Archiving and App Decommissioning

    Sponsored by: Flatirons Digital Innovations

    This year, BMO Harris Bank earmarked over 100 apps for retirement. Read on to learn the path by which BMO extracted their data from legacy applications that needed decommissioning and archived it to a central repository where it could be retained and accessed in a fully compliant manner.

  • Case Study: Data Archiving During Mainframe Systems Decommissioning

    Sponsored by: Flatirons Digital Innovations

    One global steel firm found itself with two of their apps on decades-old IBM mainframes that had no archiving capabilities. Delve into this detailed study to view the tool that enabled this firm to securely archive data from their two aging systems and decommission those outdated apps.

  • Enabling Universal SAP Data Availability

    Sponsored by: Attunity

    Download this white paper to learn about leading data replication software, Attunity, and what it can do when integrated with your SAP environment.

  • Implementing General Data Protection Regulation in SAP Environments

    Sponsored by: Attunity

    While the GDPR regulations are broad and thorough, they are open to interpretation and lack specificity regarding implementation. Download this white paper to learn how to implement the compliance policies in your SAP environment, today.

  • Protecting Sensitive Payment Data on AWS

    Sponsored by: Amazon Web Services

    While developing an online concessions payment program for local students, Snapper, an account-based solutions provider, realized its current security capabilities could use a tune-up to avoid putting student information at risk. Find out how Snapper strengthened its payment security without making concessions on customer security.

  • Pre and Post-GDPR Era

    Sponsored by: Fortinet, Inc.

    What does your organization still need to be aware of in a GDPR governed digital world? Download this resource for more information.

  • Building a Threat Intelligence Program

    Sponsored by: ThreatConnect

    Cybersecurity decision makers overwhelmingly agree that their organizations should be investing more in their threat intelligence programs. In this report, uncover research findings from 351 cybersecurity decision makers in the U.S. on best practices and impact of building a threat intelligence program.

  • Governed Data Lakes for Business Insights

    Sponsored by: IBM

    Secure data sharing is crucial when multiple teams require access to enterprise data, and to help manage this data organizations can turn to a governed data lake. In this white paper discover the architecture of a governed data lake, 4 types of data consumers, and more.

  • Data Migration Between Backup Software Solutions

    Sponsored by: Commvault

    This paper presents an alternative approach to migration between backup software solutions, one which includes a portfolio of service offerings for every migration stage and can be tailored to your data. Reading on will help you understand all your migration options.

  • Quantifying the Business Value of Commvault Software: Worldwide Customer Analysis

    Sponsored by: Commvault

    To investigate the market's leading backup solutions, IDC conducted an independent survey of Commvault's worldwide customer base to examine the business value of their backup software and solutions. Access IDC's high-level and tactical takeaways in this PDF.

  • How Safe Are Your Backups?

    Sponsored by: Solarwinds MSP

    Techvangelism founder Nick Cavalancia provides you with three steps designed to prevent inappropriate access or manipulation of your backups in this resource. Access those steps, which will help you reduce the likelihood that your backups will fall victim to an attack like ransomware, here.

  • Closing the Communication Gap Around Security & Digital Transformation

    Sponsored by: Rackspace

    Despite cybersecurity being front of mind for board members, many admit they do not have a strategy to tackle the 'how, what, where and why' questions related to data protection. Read on for an in-depth explanation of why the board and ITDMs need to close the communication gap around security and digital transformation, today.

  • Commvault HyperScale Validated Reference Design Specification

    Sponsored by: Commvault

    This document covers the validated design components of the Commvault HyperScale architecture, a unified data protection platform that delivers cloud-like services on-premises. The platform's configurations were tested with HPE ProLiant DL380 Gen 10 infrastructure, and core components and features can be found by reading on.

  • Archiving vs. Backup—What's the Difference?

    Sponsored by: Solarwinds MSP

    In this resource, Brien Posey breaks down the differences between archiving and backup, explains why those difference matter, and details the importance of having an archiving system in place for your organization. Access his insight here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.