You've requested...

Share this with your colleagues:

2016 Data Protection Vertical Industry Findings

If a new window did not open, click here to view this asset.

Download this next:

Dissecting the 360° Shared Responsibility Model

Despite growing awareness around the need for shared responsibility models, adoption isn’t where it needs to be – and Gartner warns that through 2023, at least 99% of cloud security failures will be the customers fault.

So, how can organizations ensure that their approach to cloud security encompasses the shared responsibility model?

The following white paper provides an in-depth analysis of the 360˚ Shared Responsibility Model – exploring each of the 9 capability areas, which include:

  • Physical security
  • Identity & access management
  • User, device & data controls
  • And more

These are also closely related to: "2016 Data Protection Vertical Industry Findings"

  • Maturing Your DLP Strategy for Today’s Threats

    As new technologies emerge, so do new ways to exploit systems and data. Social networks are a prime example, becoming a new avenue for cybercriminals to use tactics like social engineering to trick users into opening malware-rigged attachments. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.

  • Cloud adoption and risk Report

    Like the force of gravity in a supernova, the cloud has caused data to explode out of the enterprise to a new cloud edge with fragmented visibility and control for enterprise security.

    In this white paper, discover survey results from 1,000 enterprises in 11 countries and an investigation into anonymized events from 30 million enterprise cloud users to provide a holistic view of modern data dispersion, so you can learn and adopt your own security practice.

Find more content like what you just read:

  • Information Security Magazine - May 2012

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

    Download

  • Network security is being redefined to better block data raiders

    This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

    Download

  • Combat cloud security challenges with pervasive data defense platforms

    The complexity of managing sensitive data across hybrid cloud and multi-cloud environments is ushering in a new era of pervasive data defense and response platforms. Download this IDC report for an overview of the security benefits these platforms provide.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • Challenges With Data Protection in the Cloud

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

    Download

  • A Guide to Cyber Risk

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

    Download

  • Endpoint security: Bridging the gap between detection & response

    Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Enterprise data protection: Evaluating 6 leading vendors

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

    Download

  • Forcepoint vs. McAfee vs. the rest: 2020 data protection vendors, compared

    Choosing a new data protection partner—or replacing an existing one—is a significant decision. That’s why Forcepoint created this guide to take the guesswork out of evaluating different enterprise solutions and help you choose with confidence. In the guide, find 11 points to keep top-of-mind while you evaluate different solutions.

    Download

  • Endpoint Security IT Decision Center Handbook 2

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

    Download

  • Evaluating the features and capabilities of top endpoint security services

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

    Download

  • Debunking APT myths: What it really means and what you can do about it

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • 4 reasons to consider a CASB

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.

    Download

  • Digital employee experience: How orgs around the world are defining it

    In this eBook, ServiceNow highlights companies around the world defining the digital employee experience in their organization.

    Download

  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • Ensure your business has backup ready for ransomware

    Ransomware attacks have continued to grow in complexity, and businesses that thought they were well-prepared have to watch out, as their backup systems could be compromised along with their primary files. Read on to learn how some backup and disaster recovery vendors are able to avoid dual compromise and ensure accurate, recent file restoration.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Endpoint security suites: How 15 providers stack up

    Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats. This Forrester Wave report shows how 15 endpoint security suite providers measure up and helps security and risk professionals select the right one for their needs.

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • ISM Essentials Guide on Cloud and Virtualization Security

    Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.

    Download

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • IT in Europe: Security in the Cloud

    Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • Cloud Workload Security, Q4 2019

    The increasingly adoption of cloud technologies emphasizes the corresponding need for cloud security. In this Forrester Wave report, discover what to look for in a cloud workload security provider by evaluating and comparing 13 providers in order to equip potential customers with a comprehensive guide of what to look for in a partner.

    Download

  • CW+: Quocirca report: You sent what ?

    Electronically stored information is a key asset for any organisation, but it is often insufficiently cared for—as the numerous high profile data breaches reported in recent years demonstrate.

    Download

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • Weak links – Strengthening the information supply chain

    Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.

    Download

  • Security strategy essential to keep ahead of rapidly changing threats

    This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.

    Download

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

    Download

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

    Download

  • Closing the print security gap

    This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy.

    Download

  • ISM Essentials Guide – Threat Management

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • AI/ML: Humans will not be eclipsed by machines

    The capabilities of AI/ML are vast - but without practical use cases there will be no tangible benefits for a business. For a wide look at AI/ML capabilities and what challenges you will face in implementation, read this white paper.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • February Essentials Guide on Threat Management

    Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.

    Download

  • 2020 cybersecurity report

    Every year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape ahead. View their 2020 report to get information on 2019’s major cyber incidents, predictions for 2020, and best practices to help keep your organization safe from cyberattacks this year.

    Download

  • Smartphones: Computer Weekly Buyer's Guide

    The smartphone has transformed communication between mobile workers and their offices but at a cost.

    Download

  • Uber and Volkswagen: Handling ethics in IT

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • 10 tenets for an effective secure access service edge (SASE) solution

    As networks become increasingly dispersed, organizations struggle to keep pace and ensure security, privacy, and integrity. Recently, organizations have begun incorporating secure access service edge (SASE) frameworks. This e-book goes in-depth into what SASE is, and 10 principles required to make them effective.

    Download

  • April Essential Guide to Data Protection

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

    Download

  • Building confidence in data security

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

    Download

  • Printing: a false sense of security?

    Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations.

    Download