Research Library

Powered by

Data Loss Prevention (DLP) Research

  • Traditional Security is Dead. Long Live Micro-Segmentation.

    Sponsored by: Unisys

    This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).

  • Cybersecurity Experts Brittle Security Systems Need Overhaul

    Sponsored by: Unisys

    In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.

  • Methods for Secure, Large File Transfers

    Sponsored by: Axway

    Learn four key steps to keeping your network secure when big files exit your enterprise and low-cost options for secure,large file transfers in the enterprise in this exclusive, expert resource. Continue reading and discover how to make data exfiltration harder for hacker.

  • Mac OS X Security Checklist

    Sponsored by: JAMF Software

    This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.

  • Cloud Data Encryption Made Easy

    Sponsored by: Oracle Corporation

    This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.

  • Data Archiving for Financial Services

    Sponsored by: Proofpoint, Inc.

    Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.

  • 2015 Cost of Data Breach Study: India

    Sponsored by: IBM

    Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.

  • Supporting Technologies and Enterprise Scenarios for Deploying DLP Products

    Sponsored by: Oracle Corporation

    In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.

  • CXO Guide to Security and Archiving Challenges with Office 365

    Sponsored by: Proofpoint, Inc.

    Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.

  • Case Study: Web Host and Domain Registrar Ensures Room for Growth

    Sponsored by: Nimble Storage

    In this white paper, learn how one company overcame its inability to effectively scale its storage capacity with business growth, and eliminate their data recovery issues. See the capabilities of the flash storage option they chose, including rapid insight into storage management, capacity, and trends, reduced data center footprint, and more.

  • How Cloud Computing Transforms New Business Models

    Sponsored by: OpenText

    Cloud services now include management of deployment, apps, platforms, and IT infrastructure. In this white paper, you will learn the 6 most important considerations to keep in mind for a successful cloud partnership with your provider.

  • Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices

    Sponsored by: Citrix

    This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.

  • Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS

    Sponsored by: FujiFilm Dternity

    This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.

  • 10 Ways Data Preparation Can Assist Excel Data Analytics

    Sponsored by: Datawatch Corporation

    In this white paper, you will learn how to enrich, blend, and combine disparate data sets with a self-service data preparation solution for Excel. Access this paper now to key into the 10 most effective ways data preparation can assist your Excel-run data analytics.

  • Optimizing Your Enterprise Data Warehouse with Hadoop

    Sponsored by: Hortonworks

    This white paper examines the challenges with enterprise data warehouses (EDW), and explains how Hadoop can effectively optimize your EDW. Learn how you can archive data to Hadoop and away from EDW, offload costly ETL processes to Hadoop, and more.

  • Building Governance Into Big Data: A Meta-Data Based Approach

    Sponsored by: Hortonworks

    This white paper highlights a new approach to data management, in which governance is weaved into your modern data architecture using a meta-data service. Learn why metadata and taxonomy hold the key to comprehensive data governance, as well as key into the 4 essential elements of Hadoop governance.

  • Bolster Your DLP Systems for Safer File Sharing and Collaboration

    Sponsored by: FinalCode

    In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.

  • Leveraging Big Data Technologies to Build a Common Security Repository

    Sponsored by: O'Reilly Media

    In this white paper, learn how to successfully implement a data lake in your organization, as well as distinguish and understand different types of data. In addition, uncover the particulars of storing, accessing, and ingesting data, as well as how SIEM fits into the data lake.

  • Big Data Security for Dummies

    Sponsored by: Blue Coat Systems

    This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.

  • Turning the Tables on Cyber Criminals - Kill Chain eBook

    Sponsored by: Proofpoint, Inc.

    Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.

  • Gartner Magic Quadrant for Enterprise Information Archiving

    Sponsored by: Proofpoint, Inc.

    In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.

  • Data Loss Prevention: Data-at-Rest vs. Data-in-Motion

    Sponsored by: Identity Finder, LLC

    This white paper compares the two primary focuses of data protection – data-at-rest and data-in-motion – and analyzes which one is most effective.

  • Mobile Security Threats: Get Ready for 2016

    Sponsored by: CloudMine

    This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.

  • Don't Believe the Hype - All Containers are Not Equal

    Sponsored by: Good Technology

    This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.