ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • 2018 Cybersecurity Report

    Sponsored by: Cisco & Dimension Data

    Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.

  • Customer Trust Under GDPR

    Sponsored by: DXC

    The GDPR is the most important overhaul of data privacy in 20 years. Access this resource to gain insight into preparing your organization's data for GDPR compliance.

  • Webinar: How to Migrate Sensitive Records to AWS

    Sponsored by: AWS - Logicworks

    Migrating sensitive data to the cloud is becoming unavoidable. You'll want to make sure it's done securely, especially with GDPR's stiff financial penalties looming. Register for this webinar taking place on May 1, 2018 to learn how to migrate sensitive data to Amazon Web Services (AWS).

  • Modernizing Your Legacy Infrastructure with Cloud Content Management

    Sponsored by: Box

    Download this e-book, Modernizing Your Legacy Infrastructure with Cloud Content Management, to see how Box has transformed businesses like yours and discover what you can do right now to start making the move to the cloud.

  • Mobile and Cloud: Shaping your Content Security

    Sponsored by: Adobe Systems, Inc.

    In this e-guide, we explore how to manage sensitive content and documents, wherever they exist. Get tips about your content security options from experts like Forrester Research's Rick Holland, and learn about the potential benefits of mobile document management systems.

  • The Flawed Five: Your Guide to Insider Contact Center Cybersecurity Threats

    Sponsored by: Semafone

    Credit card numbers, user IDs, and passwords are worth a great deal on the black market. Take a look at this resource to discover 5 types of hackers posing security risks to your contact centers.

  • Transforming Security in the Mobile Cloud Era

    Sponsored by: VMware

    Malicious attacks have adapted and become more sophisticated, making it more difficult for organizations to prevent them. Take a look at this resource to learn how to protect your data, improve agility and stay compliant in the mobile cloud era.

  • 2018 Annual Cybersecurity Report

    Sponsored by: Cisco Umbrella

    Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.

  • Enabling Cybersecurity in the Age of Digital Transformation

    Sponsored by: VMware

    The aspects of digital transformation are changing enterprise IT, enabling greater business agility, but also creating a new set of cybersecurity challenges. This resource explores the impact of digital transformation on cybersecurity processes and technologies and offers strategies for securing modern enterprise IT.

  • Data Privacy & Security

    Sponsored by: Delphix

    With data breach incidents constantly hitting the headlines, organizations must protect sensitive data across the enterprise. Explore this resource to uncover a comprehensive approach to data privacy and security to ensure your organization is not the next one in the news.

  • Data Risk Management Barometer

    Sponsored by: Dell EMC and Intel®

    From data privacy to data sovereignty, the challenges of keeping data both secure and available are often subject to regulation. This IDC resource explores the data privacy legislation in the Asia-Pacific region to give you a better understanding of data privacy principles, challenges, risks, and best practices.

  • 7 Reasons Why Micro-Segmentation is Powerful

    Sponsored by: VMware

    With attacks on the data center increasing, how does your enterprise plan to remain secure? Take a look at this resource to uncover 7 reasons utilizing micro-segmentation is important to improving data center security.

  • Application-Centric Security

    Sponsored by: VMware

    The digital economy has made users and endpoints multiply, giving cybercriminals a great deal of opportunity to carry out malicious attacks. Explore this resource to uncover a strategy that builds protection into the DNA of the digital infrastructure.

  • Residency Services for Data Protection

    Sponsored by: Dell EMC and Intel®

    Developing a comprehensive data protection strategy is a key priority for organizations looking to manage explosive data growth. Access this resource to uncover how to optimize your data protection technology.

  • The Printer is an Endpoint: Proactively Addressing the Security Vulnerability

    Sponsored by: HP

    Attackers seize on the lack of attention given to printer security relative to other devices and peripherals on enterprise networks. This IDC resource highlights the vulnerable nature of printers in enterprise networks and provides steps to reduce the risk they pose to the business.

  • 7 Ways to Improve Data Center Security

    Sponsored by: VMware

    As attacks on the data center increase, security must increase as well. Take a look at this resource to discover 7 reasons leveraging micro-segmentation is critical to improving data center security.

  • Data Masking & Security

    Sponsored by: Delphix

    With data breach incidents regularly making the news, organizations must protect sensitive data across the enterprise. Access this resource to learn how the Delphix Dynamic Data Platform can help you ensure privacy, security and regulatory compliance.

  • Secure and Connect All Your Productivity Tools in the Cloud

    Sponsored by: Box

    Find out how cloud content management provides you with a central and secure content layer that unites all of your apps with seamless, native integrations.

  • Secure Data Acquisition, Communication and Processing for Your IoT Solutions

    Sponsored by: Telit

    This white paper explores the 3 pillars of IoT network security and offers advice on how you can overcome the impending cybersecurity threats while maintaining the agility you need to gain a competitive advantage.

  • 6 Steps for Building a Robust Incident Response Function

    Sponsored by: IBM Resilient

    Working only to prevent and detect cyberattacks will not protect an enterprise against cybersecurity threats. Access this resource to uncover 3 challenges of building and managing a robust incident response program as well as 6 steps for overcoming these challenges and actually building a program.

  • The GDPR Compliance Checklist

    Sponsored by: Acronis

    Has your organization identified its role in the GDPR? For many organizations, the path to GDPR compliance can be somewhat long and challenging. Given the deadline is approaching fast, uncover these 12 concrete steps to take to improve your GDPR compliance posture.

  • Externalized Dynamic Authorization in a Microservices World

    Sponsored by: Axiomatics

    How are you protecting sensitive data within microservices? Explore this webcast to learn about authorization and security within microservices to augment protection.

  • Why Your Approach to Data Governance Needs a Major Update

    Sponsored by: Delphix

    In this webcast, hear how customers are changing their approach to data governance and adapting to new regulations such as GDPR.

  • Top 5 Reasons to Implement a Data Quality Solution

    Sponsored by: BackOffice Associates

    59% of organizations have no metrics to measure data quality, which means they can't determine what poor-quality data is costing them, according to Gartner Research. Explore these 5 ways a dedicated data quality program can help your business.

  • The Power of SIEM and Incident Response for Improved Cybersecurity

    Sponsored by: IBM Resilient

    Given the growing complexities of the nature of cyberattacks, security teams need a way to respond to alerts in an orchestrated and prescriptive way. Access this resource to uncover how the power of SIEM and incident response combined can improve cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.