ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider

    Sponsored by: Nerdio

    Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.

  • 5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy

    Sponsored by: BlackBerry

    In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.

  • Top Mobile Security Threats IT Needs to Know About

    Sponsored by: BlackBerry

    In an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • What to Consider Before Buying Database Performance Monitoring Tools

    Sponsored by: TechTarget Data Management

    To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.

  • Don't Rush into Cloud Databases without a Well-Grounded Plan

    Sponsored by: Data Intensity

    In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: TechTarget Security

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

  • The Current State of Blockchain Compliance

    Sponsored by: BAE Systems Applied Intelligence

    In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Secure Information Exchange in the Digital Age

    Sponsored by: OpenText

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

  • Seeking secure Wi-Fi

    Sponsored by: MicroScope

    An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • How to Plan Your Hybrid Cloud Backup Strategy

    Sponsored by: Colospace Inc.

    Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.

  • How to Determine if Cloud ERP Software is Right for You

    Sponsored by: Sage Software

    Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.

  • Eight Emerging Data Center Trends to Follow in 2016

    Sponsored by: Chatsworth Products Europe

    Learn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.

  • The Evolution of Enterprise File Sync and Share

    Sponsored by: ibm box

    Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: McAfee, Inc.

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: McAfee, Inc.

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Insider Security Threats: What CISOs Can Do to Mitigate Them

    Sponsored by: Preempt Security

    Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.

  • Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes

    Sponsored by: UXC Oxygen and Amazon Web Services

    More enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.

  • Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget

    Sponsored by: IBM

    Learn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.