Data Security Research
-
How to Segment Cloud Workloads for Better Security
Sponsored by: IBMEnterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
-
The Security Risks of Network Sensors in the Enterprise
Sponsored by: IBMIn this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
-
Five Ways to Secure Mobile Data with EMM
Sponsored by: vmware airwatchIn this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.
-
The Truth After the Hype: Improve Mobile Data Security
Sponsored by: vmware airwatchIn this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
-
Building an Unstructured Data Protection Program
Sponsored by: STEALTHbitsIn this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
-
Discover the Most Important App Security Testing Basics
Sponsored by: SynopsysUse this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.
-
What Are The Security Benefits of Using Thin Client Devices?
Sponsored by: Dell, Microsoft and CitrixThin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.
-
E-discovery Software Brings Serious ROI to Information Governance
Sponsored by: Globanet VeritasAccess this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
-
Data Governance: Expert Q&A and Picking The Right DG Tool
Sponsored by: Globanet VeritasThis e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
-
What to Look for in Web Fraud Detection Systems
Sponsored by: TechTarget SecurityIn this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
Get the Most Out of Your SIEM System
Sponsored by: TrustwaveSIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
-
Ransomware Protection is Futile, but All Hope is Not Lost
Sponsored by: Dell SoftwareDiscover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
5 Steps to Raising Ransomware Resistance
Sponsored by: TechTarget SecurityThis TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
-
Preventing Ransomware Threats to Health Data in 10 Steps
Sponsored by: Cisco UmbrellaHealth data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
-
How Healthcare Organizations are Tackling IoT Device Management
Sponsored by: Cisco UmbrellaConnected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
-
Squash Large Business Email Security Challenges
Sponsored by: Intermedia NetIf you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
-
Best Practices for Your Disaster Recovery/Business Continuity Plan
Sponsored by: McKesson CorporationIn this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
-
How To Get the Most Out of SOCs
Sponsored by: ServiceNowThis e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
-
A themed issue looking at the latest trends in print management
Sponsored by: MicroScopeA themed issue of the ezine looking at the opportunities for the channel in the managed print world
-
Is the Hybrid Storage Array Dying?
Sponsored by: Dell EMCIs hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
-
Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?
Sponsored by: Dell EMCIs it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.
-
Five Ways to Secure Mobile Data with EMM
Sponsored by: Hewlett Packard EnterpriseFor most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.
-
Ease Backup Woes with Cost-Efficient Data Archiving
Sponsored by: RubrikGeorge Crump, President of Storage Switzerland, highlights how a modern data archiving solution can dramatically reduce the amount of data that needs to be backed up and managed on a daily basis. Read on and discover multiple data archiving storage and software solutions that can save your enterprise money and ease backup issues.