Research Library

Powered by

Data Security Research

  • Protecting Your Sensitive Data

    Sponsored by: Symantec

    Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.

  • 6 Ways a CASB Makes Cloud Apps Safe for Business

    Sponsored by: Symantec

    By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.

  • Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    According to an Oracle study, 77% of organizations have already adopted cloud services and 10% of those companies describe themselves as heavy users.This resource explores the root cause behind the confusion of the shared responsibility model and offers examples of how enterprises are successfully addressing and embracing the model.

  • Web Application Security in a Digitally Connected World

    Sponsored by: Radware

    According to a recent Ponemon and Radware study, 68% of organizations admit low confidence in their information secure posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.

  • The Future of Privileged Management

    Sponsored by: One Identity

    The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn about where privileged management is heading and uncover an approach to securing privileged accounts.

  • Cloud Apps and Data Security: Are You Safe from the New Threats?

    Sponsored by: Symantec

    How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your business' IoT strategy.

  • Regulating Privileged Access: When to Require Human Approval Workflows

    Sponsored by: One Identity

    Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity

  • Mitigate the top nine cloud threats with a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • DRaaS Ushers in Changes to Data Protection Strategy

    Sponsored by: Carbonite

    What can DRaaS offer your organization? Download this white paper to find out, and to combat the high cost of downtime. Inside, you'll find 10 critical questions to ask any DRaaS provider, instruction on how to use DRaaS to support legacy platforms, and more.

  • Making the case for a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.

  • Going big data? You need a cloud strategy

    Sponsored by: Oracle Corporation

    This Forrester Research report examines the current state of cloud big data analytics. From integration to security, learn about PaaS-based big data strategies, and explore the report's key findings about big data investment trends.

  • 8 Essential Secure Web Gateway Characteristics

    Sponsored by: Symantec

    According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,2321. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.

  • Global De-Duplication for Encrypted Data

    Sponsored by: Carbonite

    Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.

  • Identity Analytics – A more Collective Defense

    Sponsored by: One Identity

    As technology evolves, managing access is especially difficult when dealing with users, groups, computers, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program.

  • GDPR, Personalization Strategies, and the Customer View of Data Protection

    Sponsored by: Tealium

    In this DataIQ research report, find out how aware customers are of the way data is collected from their digital footprint, as well as how businesses will have to approach their reliance on customer data to deliver personalized customer experiences in light of GDPR compliance.

  • Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

    Sponsored by:

    In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

  • Threat Intelligence: Cybersecurity's Best Kept Secret

    Sponsored by: CrowdStrike

    Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.

  • 8 Signs your ECM System is Past its Useful Life

    Sponsored by: Nuxeo

    Discover 8 signs your enterprise content management (ECM) system is obsolete and find out how you can make sure your ECM strategy is up to the challenge of modern data volumes and security demands.

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

  • 2018 Endpoint Security Survey

    Sponsored by: Tanium

    According to the 2018 PwC Global State of Information Security Survey, many companies vulnerable to cyberattacks remain unprepared to deal with digital intrusions. Explore this endpoint security survey to uncover what organizations think about the challenges of incident response, investigation and remediation on endpoints.

  • What to Know about SIEM as a Service

    Sponsored by: LogRhythm, Inc.

    Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • How to Improve SIEM Systems with Machine Learning

    Sponsored by: LogRhythm, Inc.

    In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.

  • Large Network Deployment And Mobile Footprint Strategy

    Sponsored by: Entrust, Inc.

    Explore this case study to gain insight into how a technology provider transitioned to the cloud securely, while protecting sensitive data across its corporate network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.