ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intellectual Property Research

  • How to create an effective data protection strategy for IT compliance

    Sponsored by: TechTarget Security

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • What's Behind a Cyber Attack?

    Sponsored by: IBM

    This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • Analyst advice for IT security leaders

    Sponsored by: IBM

    Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.

  • Storage Magazine: How to improve your virtual server storage setups

    Sponsored by: IBM.

    In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.

  • Solitarie Interglobal: Tracked, Hacked and Attacked

    Sponsored by: IBM.

    Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • Negotiating cloud contracts

    Sponsored by: TechTarget ComputerWeekly.com

    This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn

    Sponsored by: Symantec Corporation

    Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Implementing an Effective Data Loss Prevention Solution for Your Network

    Sponsored by: IBM

    Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.

  • Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It

    Sponsored by: Symantec Corporation

    This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.

  • Top Benefits of Symantec Protection Suite

    Sponsored by: Symantec Corporation

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • IBM Rational Asset Manager e-Kit

    Sponsored by: IBM

    Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.

  • Collaboration solutions: Solutions for small and medium business

    Sponsored by: IBM

    Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.

  • Managing the Entire Database Security & Compliance Lifecycle

    Sponsored by: Guardium, an IBM Company

    Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.

  • New Insider Threat Emerges in the New Economy

    Sponsored by: Lumension

    Learn how employees and partners are engaging with IT assets and intellectual property.

  • Dell ProSupport Certified Data Destruction

    Sponsored by: DellEMC and Intel®

    The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.

  • Keep Your Hard Drive

    Sponsored by: DellEMC and Intel®

    The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives.

  • Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008

    Sponsored by: Microsoft

    This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.

  • Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World

    Sponsored by: Black Duck Software

    Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.

  • China Auto Industry Research - Inside China: The Chinese View Their Automotive Future

    Sponsored by: IBM Line of Business

    Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.

  • Global Threat Research Report: Russia

    Sponsored by: VeriSign, Inc

    This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.

  • 10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis

    Sponsored by: Techrigy

    Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.