Research Library

Powered by

Data Security Research

  • Magic Quadrant for Enterprise Data Loss Prevention

    Sponsored by: Digital Guardian

    Take a look at the leading data loss prevention (DLP) vendors like Digital Guardian, Symantec, and Intel Security to differentiate their core capabilities and which ones are right for your enterprise.

  • Threat Hunting eBook

    Sponsored by: Digital Guardian

    Cyberthreat hunting is the new threat management. Access this e-book for a step-by-step guide on how to stay on top of the ever evolving threat landscape.

  • Definitive Guide to Data Loss Prevention

    Sponsored by: Digital Guardian

    As security pros struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. Take a look at this 67-page guide for a better understanding about DLP technologies and how the 10+ year old technology has evolved.

  • A Risk Manager's Guide to the General Data Protection Regulation (GDPR)

    Sponsored by: BitSight

    Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.

  • Definitive Guide to Data Classification

    Sponsored by: Digital Guardian

    In the case of your growing data, prioritization comes from data classification. In this 8 part guide, you'll learn about what classification is, why it is important and even foundational to data security.

  • The Secret to Creating a Cyber Risk-Aware Organization

    Sponsored by: BitSight

    Cybersecurity within an organization is no longer just the security pro's responsibility. It's everyone's. Find out why your business could benefit from a security awareness training and become a cyber risk-aware organization.

  • 5 Key Steps for GDPR Compliance

    Sponsored by: Plixer

    Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.

  • How Cloud Security Keeps Patient and Employee Data Safe at Memorial Hermann Health System

    Sponsored by: Cisco Umbrella

    In this case study, learn about how Memorial Hermann Health System found a solution that integrated with their existing security stack, to better protect patients and providers against ever-evolving threats.

  • Five Ways Privileged Access Management Prevents Insider Threats

    Sponsored by: HelpSystems

    Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.

  • Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs

    Sponsored by: InteliSecure

    In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.

  • Data Security for the Cloud Era

    Sponsored by: McAfee, Inc.

    A cloud-native data security platform provides unique capabilities to keep your data secure after you put it in the cloud. Discover some of the benefits of McAfee Skyhigh Security Cloud.

  • The Security Dangers Lurking in Your Hybrid Cloud Environment

    Sponsored by: HelpSystems

    Hybrid cloud is good for its scalability, but security is likely taking a backseat, which leads to the ugly truth: you and your customers are at high security risk. Download this white paper to uncover the truth about cloud security and learn how to take back control of your hybrid cloud environment.

  • Privileged Access Manager Data Sheet

    Sponsored by: CA Technologies

    Explore ways your organization can clean up its security best practices with privileged access management, managed passwords, multifactor authentication, and more.

  • How to Build a Micro-Segmentation Strategy

    Sponsored by: Illumio

    Learn how micro-segmentation reduces your attack surface, frustrates intruders, can be used as a compensating control against vulnerabilities, and hardens your data center.

  • Collaboration: Having the Right Tool Can Give You A Competitive Advantage

    Sponsored by: Dropbox

    Collaboration is not a one-size-fits-all issue. Your organization requires a unique platform that addresses your specific needs. Download this white paper to learn about Dropbox's features, and how it was designed to make working together easy, while keeping your files secure.

  • Taking Control of Your Enterprise Data Begins with a Data Strategy

    Sponsored by: Intel

    Gaining value from your data requires a defined data strategy. In this white paper, discover how to establish a clear data strategy and governance for turning your data into a business advantage.

  • Protect Your Data at Every Point Possible

    Sponsored by: Dell EMC and IntelĀ®

    According to a recent Dell EMC survey, 36% suffered data loss or downtime due to security breaches. Download this brochure to find out how to protect your data to avoid future business challenges.

  • 6 Ways to Prevent Ransomware in Health IT

    Sponsored by: Cisco Umbrella

    With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.

  • Ransomware Attacks Plaguing Health IT

    Sponsored by: Cisco Umbrella

    Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.

  • Deploy your Database with Flexibility, Security, and Performance

    Sponsored by: Red Hat

    Microsoft SQL Server 2017 already provides the database management you need for your critical data, application, and analytics workloads. Explore this resource to learn how you can use supplemental open-source software with SQL Server 2017 for additional benefits, such as speed, consistency, cost efficiency and more.

  • The Inside Story of Data Breaches and Mainframe Security

    Sponsored by: CA Technologies

    31% of consumers discontinued their relationship with a company that had a data breach (Reputation Risk Study 2017). Don't let your organization become a statistic. Read on.

  • Protect Your Mainframe from the Inside Out

    Sponsored by: CA Technologies

    77% of data breaches come from internal sources, according to the Ponemon Institute. While it would be nice to trust your employees with your mainframe of data, this is not a wise decision. Download this resource to discover how an access management system can protect your mainframe from internal data breaches.

  • GDPR: Information Security, Governance and Regulations Working in Unity

    Sponsored by: CA Technologies

    What is data privacy if not data security? Organizations must focus more on data security now that new GDPR regulations are in effect. In this insight report, learn how information governance and IT professionals come together with security software to establish a foundation for GDPR compliance.

  • GDPR Readiness Starts With the Mainframe: Here's Why

    Sponsored by: CA Technologies

    How do you evaluate your GDPR readiness? Download to learn why mainframe teams should be a part of GDPR planning and discover 10 questions your security practitioners should ask to evaluate current GDPR readiness.

  • A Short Primer of GDPR Essentials

    Sponsored by: Splunk

    Don't allow new GDPR regulations to spring fines on your business. Download this resource to access a primer of information regarding GDPR, including financial implications, key focus areas, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.