ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • What SCCM Admins Need to Know About Windows 10

    Sponsored by: VMware

    Desktop administrators are over-burdened with increasing demands to maintain and secure Microsoft Windows infrastructure. Windows 10 allows desktop admins to rethink their endpoint management strategies and embrace a more efficient model for desktop management. Download the whitepaper to learn everything you need to know about Windows.

  • End-User Security Survey: How Common is Confidential File Sharing?

    Sponsored by: Dell and Intel

    To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results.

  • 5 Milestones to GDPR Success

    Sponsored by: Absolute

    The GDPR deadline is rapidly approaching with many privacy and security professionals unsure of where to begin to prep. To meet the May 2018 deadline, organizations must prepare today. Access this Forrester report to discover 5 milestones you must reach to achieve GDPR compliance success.

  • The Security Compliance Countdown

    Sponsored by: Citrix

    May 25, 2018 – the deadline for GDPR compliance – is right around the corner. However, 48% of organizations believe their security infrastructure doesn't facilitate compliance, according to a Ponemon Institute study. This infographic reveals a "to-do" list to help your organization safeguard personal data in preparation for the GDPR.

  • The Cybersecurity Blueprint

    Sponsored by: Solarwinds MSP

    As cybersecurity attacks grow in variety, taking a broad layer approach with clients is crucial. Explore this resource to uncover the 4 pillars of a comprehensive, layered security approach and learn how to provide strong layered security.

  • 2018 Security Predictions for an Unpredictable World

    Sponsored by: Whitehat Securities

    Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.

  • Cybersecurity in Business Operations

    Sponsored by: Virginia Tech Online

    Recent security breaches have made clear the fact that guarding the infrastructure is not only the responsibility of the IT desk. All users, from entry-level personnel to the C-suite, must help protect the integrity of their data assets.

  • Secure Cloud Collaboration without the Complication

    Sponsored by: Citrix

    There are still some lingering doubts about the cloud's ability to maintain high security standards, but you can put them to rest. Read this white paper to learn how cloud-based collaboration tools are securing the apps, data, files, and services you depend on every day to provide a safe collaboration space for your employees.

  • SyncDog Metropolitan Police Department Case Study

    Sponsored by: SyncDog

    In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.

  • Lessons Learned from an Enterprise-Scale Data Migration Project

    Sponsored by: Scribe Software Corporation

    Listen in as Lars Muller (from CRM Partners AG) gives expert advice on how to migrate data to the cloud, detailing a strategic step-by-step approach to integrating data safely and effectively.

  • Getting the Most out of your AppSec Program

    Sponsored by: Whitehat Securities

    According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.

  • The Truth about Cloud Security

    Sponsored by: Citrix

    The first impression that cloud computing left on people was that the technology was filled with security flaws. While the risks are real, the cloud is more secure now than most people think. Access this e-book to learn about using the cloud to protect your most sensitive data.

  • 5 Security Tips to Work on a Personal Device

    Sponsored by: Citrix

    Mobility and personal devices are defining factors of the future workforce. Read this report for five tips to help you secure your personal device at work and minimize risk for yourself and your business. You will also see how employees act differently when using personal versus work devices, the importance of updating devices, and more.

  • How to Minimize the IAM Risks Associated with Third-Party Relationships

    Sponsored by: Identity Automation

    With 63% of breaches resulting from weak, default, or stolen passwords, it's clear that single-factor authentication isn't enough to secure data. Locking down third-party accounts with privileged access management is more urgent than ever. Discover a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)

    Sponsored by: Oracle Corporation

    According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • Making the Case for a Cloud Access Security Broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security.

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.

  • Two-Factor Authentication Evaluation Guide

    Sponsored by: Duo Security

    This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.

  • Always on GDPR - The Visibility to Act Like the Pros

    Sponsored by: Nuix

    The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.

  • Contingent Workers

    Sponsored by: Identity Automation

    By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.

  • The 2017 Trusted Access Report

    Sponsored by: Duo Security

    The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.

  • The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance

    Sponsored by: Nuix

    Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.

  • Connected Intelligence: GDPR and Incident Response

    Sponsored by: Nuix

    The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.

  • Don't Switch To Windows 10 Without An Endpoint Security Plan

    Sponsored by: Thycotic

    According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.