ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.

  • The Security Risks of Network Sensors in the Enterprise

    Sponsored by: IBM

    In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: vmware airwatch

    In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • Discover the Most Important App Security Testing Basics

    Sponsored by: Synopsys

    Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.

  • What Are The Security Benefits of Using Thin Client Devices?

    Sponsored by: Dell, Microsoft and Citrix

    Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.

  • E-discovery Software Brings Serious ROI to Information Governance

    Sponsored by: Globanet Veritas

    Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.

  • Data Governance: Expert Q&A and Picking The Right DG Tool

    Sponsored by: Globanet Veritas

    This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: TechTarget Security

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • Get the Most Out of Your SIEM System

    Sponsored by: Trustwave

    SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by: TechTarget Security

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Preventing Ransomware Threats to Health Data in 10 Steps

    Sponsored by: Cisco Umbrella

    Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia Net

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Best Practices for Your Disaster Recovery/Business Continuity Plan

    Sponsored by: McKesson Corporation

    In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.

  • How To Get the Most Out of SOCs

    Sponsored by: ServiceNow

    This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.

  • A themed issue looking at the latest trends in print management

    Sponsored by: MicroScope

    A themed issue of the ezine looking at the opportunities for the channel in the managed print world

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?

    Sponsored by: Dell EMC

    Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.

  • Five Ways to Secure Mobile Data with EMM

    Sponsored by: Hewlett Packard Enterprise

    For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.

  • Ease Backup Woes with Cost-Efficient Data Archiving

    Sponsored by: Rubrik

    George Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.