Research Library

Powered by

Data Security Research

  • The Key Pillars For Protecting Sensitive Data In Any Organization

    Sponsored by: Thales

    Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.

  • The Total Economic Impact of Armor Anywhere

    Sponsored by: Armor

    In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.

  • Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

    Sponsored by:

    In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.

  • Security for Modern Data Centers

    Sponsored by: Fortinet, Inc.

    Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.

  • 4 Ways Commvault Activate Improves Your Ability to Know, Manage, and Use Your Data

    Sponsored by: Commvault

    Check out this white paper to learn 4 ways Commvault Activate can improve the way you know, manage, and use your data for security and governance purposes.

  • The Reality of Ransomware – Is Your Data Recovery Ready?

    Sponsored by: Commvault

    Access this data sheet to view a 5-step plan to protect against ransomware and discover 7 distinguishing features of Commvault ransomware recovery.

  • The Complete Guide for Preventing Costly Data Leaks for UK Local Governments

    Sponsored by: Zivver

    For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.

  • Securing Public Clouds: Understand the Cloud Shared Responsibility Model

    Sponsored by: Radware

    As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.

  • At the Edge of Change

    Sponsored by: Aruba Networks

    As the volume of network data explodes it must be processed, stored and analyzed near its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.

  • RAT Protection for Banking Customers That Works

    Sponsored by: Buguroo

    Check out this white paper to learn about bugFraud from Bugaroo, a next-gen fraud prevention solution that identifies user’s behavioral and cognitive analytics to uniquely profile users in order to prevent online banking fraud through remote access trojan (RAT) attacks.

  • Decade of the Rats

    Sponsored by: BlackBerry

    The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.

  • See and Defend Cloud Workloads with CrowdStrike and AWS

    Sponsored by: AWS & CrowdStrike

    Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.

  • Data Storage for Every Data Tier

    Sponsored by: Iron Mountain

    Access this data sheet to learn how Iron Mountain’s Data Management Service Portfolio lets you do things like easily move inactive cloud data to tape, decrease your storage costs and ensure long-term archival data compliance.

  • Veeam Availability Suite v10: Backup and Recovery Capabilities You Didn’t Know About

    Sponsored by: Veeam Software

    Access this webcast to learn the 5 most important capabilities to consider when protecting your assets, no matter where they are, how to move backup copies off site in a safe and secure way, and much more.

  • Aruba Clearpass Enables Secure and Robust Connectivity for Thousands Of Users In A Multi-Vendor Environment

    Sponsored by: TechData

    Since UST Global’s operations are spread across the globe, their associates always need secure connectivity. This means that rather than having a stable and flexible wireless network, they also had to ensure the highest level of data security. Download this case study to learn how UST Global was able to achieve this with the help of Aruba.

  • Benefits of Migrating from Web Access Management (WAM)

    Sponsored by: Okta

    For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.

  • Choosing the Best Mobility Management Solution

    Sponsored by: BlackBerry

    Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.

  • Futureproofing IoT

    Sponsored by: BlackBerry

    The number of devices connected to the internet of things (IoT) is set to more than double in the next five years. While a surge in data promises gains in efficiency and productivity, experts warn of the growing threat from state-sponsored hackers. In this report, explore the steps businesses must take to ensure their IoT is properly secured.

  • Compliance Made Easy

    Sponsored by: Armor

    The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.

  • Distance Learning’s Impact on Education IT

    Sponsored by: Absolute Software Corporation

    The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.

  • What is Operational Resilience?

    Sponsored by: LogicGate

    According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.

  • Key Requirements of EDR: Business Needs Mandate Visibility Beyond the Endpoint

    Sponsored by: Palo Alto Cortex

    Access this white paper to learn about the 4 central points of cybersecurity of the future and the key requirements of endpoint protection (EPP) and endpoint detection and response (EDR).

  • Report: Build the Business Case for Cybersecurity and Privacy

    Sponsored by: Okta

    Mega data breaches will often spur organizations to invest in cybersecurity. However, if the approach is reactive and unplanned, then it’s a wasted opportunity. Use this report to structure a sound business case for cybersecurity and privacy investments that will both provide assurance to the stakeholders and value to the business.

  • What Strategies Can Alleviate Executive Concerns Over Data Breaches?

    Sponsored by: LogicGate

    As data breaches and cybersecurity become a growing concern felt by the entire organization, CEOs face an increasingly difficult task of identifying, communicating and preventing risk across various departments. Read this blog post for the results of a survey designed to understand this issue from the perspective of the CEO.

  • Leverage the power of Rapid7 and AWS integrated threat protection and response solution

    Sponsored by: AWS Rapid7

    Cloud environments are growing at such a rapid pace that traditional SIEM tools often lack the visibility to identify and mitigate threats – leading to an overworked security staff. This webinar discusses how the integration of Rapid7 InsightIDR and Amazon GuardDuty can improve visibility (and morale) for organizations with AWS environments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.