Data Security Research
-
Handbook: Choosing a Converged Data Protection Solution
Sponsored by: TechTarget Data BackupThis guidebook offers expert advice on evaluating converged data protection solutions, with consideration given to the value and risk of integrating data protection and management and what vendors have to offer. For assistance with assessing your company's options, read the guidebook here.
-
Strengthen Health IT Security, Maintain HIPAA Compliance
Sponsored by: PatientKeeperDownload this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
-
The State of Cybersecurity and How It Will Evolve
Sponsored by: ALTRDownload this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
-
Managing Customer Data in the GDPR Era
Sponsored by: GearsDesignDownload this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
-
How to Manage the Multi-cloud with Security and Strong Data Backup
Sponsored by: TechTarget StorageThe following e-book will help you with managing multi-cloud backup and security. Read it here to learn everything you need to know about securing a multi-cloud deployment, multi-cloud management must-haves, and more.
-
Best Practices for Data Backup and DR Planning in 2019
Sponsored by: New Cloud NetworksIn this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
-
Startup Hammerspace Launches with Hybrid Cloud-era NAS Virtualization
Sponsored by: HammerSpaceStartup Hammerspace has come out with a product that aims to give customers access to unstructured data, anywhere and on-demand. Read this e-guide to learn more about Hammerspace, key use cases for this solution, and more on how it aims to simplify multi-cloud storage.
-
Investigate Uses for Security Messaging for Healthcare
Sponsored by: TechTarget Health ITIn this handbook, explore the notions of the technology behind secure messaging for healthcare organizations and best practices for protecting patient data.
-
Hyper-converged Secondary Storage: More Than Just a Trend
Sponsored by: CohesityThis guide delves into Cohesity's hyper-converged secondary storage platform, and explains why this new category of backup offerings is more than just a trend. Read on for the exclusive details, including an article illustrating how Cohesity's scale-out system replaced legacy EMC at Piedmont HealthCare in North Carolina.
-
6 Ways to Prevent Ransomware in Health IT
Sponsored by: Cisco UmbrellaWith so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
-
Ransomware Attacks Plaguing Health IT
Sponsored by: Cisco UmbrellaLearn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
-
Integrating IAM into your Digital Workspace
Sponsored by: CitrixLearn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
-
Ins and Outs of Setting up a SOC
Sponsored by: Respond SoftwareFind out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.
-
GDPR: 10 essential facts you need to know
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
-
New Cloud Threats to Watch Out for in 2018
Sponsored by: Juniper NetworksSafeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.
-
Get your Content Management System GDPR-Ready
Sponsored by: BoxIn this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.
-
Mobile and Cloud: Shaping your Content Security
Sponsored by: AdobeIn this e-guide, we explore how to manage sensitive content and documents, wherever they exist. Get tips about your content security options from experts like Forrester Research's Rick Holland, and learn about the potential benefits of mobile document management systems.
-
An Introduction to the FIDO Authentication Standard
Sponsored by: HYPR63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
-
Optimizing Endpoint Security for the Enterprise
Sponsored by: ConvergeOneGiven the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.
-
Your Guide to MFA
Sponsored by: HYPRMany IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
-
Data Classification Services and Keeping Cloud Data Secure
Sponsored by: Data443In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
-
GDPR Looms with Organizations Still Unprepared
Sponsored by: Data443GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.
-
The Security Benefits of DLP
Sponsored by: InteliSecureSecurity breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
-
Build your Content Security and Document Management Plan
Sponsored by: AdobeIn this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
-
The Right Track to GDPR Compliance
Sponsored by: Lynx Technology PartnersThe GDPR is creating a pivotal change in how organizations process personal data, and it's clear there are a few areas of misunderstanding surrounding the regulation. Explore this expert e-guide to get a better understanding of the GDPR.