ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security White Papers

  • Does the GDPR Apply to You?

    Sponsored by: Imperva

    Organizations which are not in compliance with the GDPR can expect very stiff financial penalties. This resource offers insight into which organizations the GDPR applies, key data security requirements of the regulation, non-compliance penalties and more.

  • GDPR: The Penalties for Non-Compliance

    Sponsored by: Imperva

    The GDPR gives data protection authorities more investigative and enforcement powers. This resource reveals the harsh penalties of not complying with the GDPR.

  • Integrating Human and Technological Elements in your Security Strategy

    Sponsored by: Kaspersky Lab

    Cybercrime damages are expected to cost the world $6 trillion by 2021, according to CSO. This resource offers strategies for protecting your business from the ever-changing threat landscape.

  • The Mystery of the APT

    Sponsored by: Kaspersky Lab

    For companies that experiences a targeted attack, 68% report data loss or exposure as a direct result of the attack, according to a Kaspersky Lab study. This resource reveals insight into advanced persistent threats (APTs) and offers protection strategies to avoid falling victim to harmful attacks.

  • 5 Ways Modern Malware Defeats Your Defenses

    Sponsored by: Radware

    According to the Verizon DBIR, 51% of data breaches include the usage of malware, whether for initial breach, expansion within the network or heisting data. This resource reveals 5 common evasion techniques used by modern malware and how they conquer anti-malware defenses.

  • Get Going with your GDPR Plan

    Sponsored by: Imperva

    How is your organization preparing for GDPR's May 2018 deadline? Take a look at this infographic to uncover a step-by-step plan for complying with the GDPR.

  • Understanding the General Data Protection Regulation

    Sponsored by: Evident

    To avoid stiff GDPR penalties, your business will need to spend a great deal of time assessing and planning to implement operational and technology changes. Here are 5 areas you'll need to consider.

  • Top 5 Database Security Threats

    Sponsored by: Imperva

    According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk sensitive organizations must remain a step ahead in their security posture.

  • Datto's State of the Channel Ransomware Report: Canada

    Sponsored by: Datto, Inc.

    This research report from more than 200 MSPs in Canada outlines how ransomware is targeting customers, and how your contemporaries are combatting this growing threat.

  • Preparing Your Organization for the GDPR

    Sponsored by: Imperva

    Where does your organization stand in terms of GDPR preparedness? Access this resource to uncover 5 questions to determine what GDPR means for your organization and how to prepare.

  • 6 Ways a CASB Makes Cloud Apps Safe for Business

    Sponsored by: Symantec

    By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.

  • Cloud Security: Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.

  • Web Application Security in a Digitally Connected World

    Sponsored by: Radware

    According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.

  • Cloud Apps and Data Security: Are You Safe from the New Threats?

    Sponsored by: Symantec

    How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.

  • Mitigate the top nine cloud threats with a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • DRaaS Ushers in Changes to Data Protection Strategy

    Sponsored by: Carbonite

    What can DRaaS offer your organization? Download this white paper to find out, and to combat the high cost of downtime. Inside, you'll find 10 critical questions to ask any DRaaS provider, instruction on how to use DRaaS to support legacy platforms, and more.

  • Making the case for a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.

  • Going big data? You need a cloud strategy

    Sponsored by: Oracle Corporation

    This Forrester Research report examines the current state of cloud big data analytics. From integration to security, learn about PaaS-based big data strategies, and explore the report's key findings about big data investment trends.

  • 8 Essential Secure Web Gateway Characteristics

    Sponsored by: Symantec

    According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,232. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.

  • Global De-Duplication for Encrypted Data

    Sponsored by: Carbonite

    Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.

  • GDPR, Personalization Strategies, and the Customer View of Data Protection

    Sponsored by: Tealium

    In this DataIQ research report, find out how aware customers are of the way data is collected from their digital footprint, as well as how businesses will have to approach their reliance on customer data to deliver personalized customer experiences in light of GDPR compliance.

  • Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

  • Threat Intelligence: Cybersecurity's Best Kept Secret

    Sponsored by: CrowdStrike

    Since threat intelligence comes in many shapes and forms, misunderstandings about what cyber threat intelligence (CTI) entails is common. This resource offers 4 use cases on CTI and explains different categories of CTI and how it can be optimized within security teams.

  • 8 Signs your ECM System is Past its Useful Life

    Sponsored by: Nuxeo

    Discover 8 signs your enterprise content management (ECM) system is obsolete and find out how you can make sure your ECM strategy is up to the challenge of modern data volumes and security demands.

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.