Data Security Research
-
Scale-Out NAS vs. Object Storage
Sponsored by: TechTarget StorageThis issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.
-
Five Quick Tips on Microsoft Azure Management
Sponsored by: Rackspace TechnologySince 2015, Microsoft claims its cloud service has seen an increase in adoption with more than 10,000 new customers signing up for Azure each week. This e-guide explores five resources to help you get better acquainted with some of the key features of Microsoft's cloud offering.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
CDP vs. Legacy: Get the Most Out of Your Backup
Sponsored by: TechTarget Data BackupThe convergence of data backup, disaster recovery and archiving can save your enterprise money and storage space. Discover how continuous data protection technology can ease the convergence of backup software and primary storage and enable a storage system in which all the data in an enterprise is backed up whenever any change is made.
-
Stop Future Threats though Careful Examination of the Malware Lifecycle
Sponsored by: Check Point Software Technologies Ltd.This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
-
Best Practices for Monitoring Today's Murky Threat Environment
Sponsored by: Hewlett Packard EnterpriseIn today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
-
The Pros and Cons of Microsegmentation for your Virtualized Environments
Sponsored by: NTT Com Security (UK) LtdMicrosegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.
-
Customer Use Cases: Implementing Unified Data Protection Solutions
Sponsored by: arcserveIn this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.
-
QRadar: Expert SIEM Product Overview
Sponsored by: IBMLooking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
-
Mobile Data Security Threats: Hype vs. Reality
Sponsored by: LookoutAs threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
-
Object Storage Architecture Removes File Crawl Issues
Sponsored by: CloudianIn this expert guide, find out the many differences of object storage that make it that much more efficient and economical fit for your enterprise, such as active or cold archiving, search, analytics, and more.
-
Enterprise Email and Office 365 Security
Sponsored by: Check Point Software Technologies Ltd.One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
-
The Impact of Not Keeping Up with Cybercriminals
Sponsored by: ProofpointOrganizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.
-
Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.
-
Security Challenges in Healthcare Social Media Usage
Sponsored by: ActianceIn this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
-
An Effective Data Archiving System Can Ease Backup Woes
Sponsored by: VeritasThis e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
-
Data Protection Methods: Mounting Backups vs. Recovering from Backups
Sponsored by: VeritasThis e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
-
Computer Weekly: Robots at Your Service
Sponsored by: TechTarget ComputerWeekly.comMany digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
-
Protecting Patient Data in the Mobile Era
Sponsored by: TechTarget Health ITThe rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
-
Information Security ANZ March 2016
Sponsored by: TechTargetAustralian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
-
Where's the Collaboration in Enterprise Collaboration Tools?
Sponsored by: TechTarget Content ManagementEnterprise collaboration tools can help generate sales, reduce costs and connect dispersed workers. So why are many companies hesitant to use them? In this e-guide, you'll ensure strong governance policies are at the heart of your enterprise-wide collaboration strategy and learn the secrets of collaboration success.