Research Library

Powered by

Data Loss Prevention (DLP) Research

  • Plan for Disaster Recovery Based on Specific Threat Considerations

    Sponsored by: LogicNow

    Benjamin Franklin's adage 'an ounce of prevention is worth a pound of cure' holds true for disaster recovery scenarios. Being proactive is better than being reactive. Download this e-book to access 5 key questions to ask yourself when planning and future-proofing your disaster recovery strategies.

  • How to Choose the Right Disaster Recovery Solution

    Sponsored by: LogicNow

    In this e-book, you will learn how to formulate tactical backup and recovery by considering the possible disasters, matching them with the data sets to be protected, and identifying key recovery objectives. Read on to build a DR solution requirements list that specifically matches your organization's needs.

  • Security & Compliance Are No Gamble

    Sponsored by: Armor

    Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • Database Audit and Protection Tips

    Sponsored by: Imperva

    Data auditing for security and compliance is a critical component in a data-centric security strategy. Discover an actionable set of tips for organizations looking to implement a data-centric security strategy that addresses data audit and protection. Get tangible data security benefits while simplifying the compliance audit process.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

  • Build Vs. Buy: Calculate the TCO of BDR

    Sponsored by: Datto

    Calculate the economics of a build-your-own vs. a complete backup and disaster recovery (BDR) offering from this profitability checklist. Read on to get the full picture of the TCO of BDR, factoring in upfront and ongoing costs, as well as operating expenses into your decision to build or buy.

  • Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage

    Sponsored by: Dell EMC

    David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

  • When Evaluating Data Protection/DR, Look Beyond the Cost-Benefit Analysis

    Sponsored by: Dell Software

    Learn how to quantify the risks your IT systems face, determine if your data archiving, backup, and disaster recovery is up to scratch, and evaluate integrated data protection solutions beyond just the simplistic cost-benefit analysis.

  • Buyer's Guide to Enterprise Collaboration Solutions

    Sponsored by: IntraLinks, Inc

    Content collaboration platforms provide security and ease of use so mission-critical processes aren't interrupted. Learn what to look for in these platforms and how to decide which one is right for your organization.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by:

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

    Sponsored by: Ambra

    Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Case Study: Disc Comfort Fuses Image Management and the Cloud

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.

  • CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS

    Sponsored by: Ambra

    Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.

  • The New World of Unified Image Management

    Sponsored by: Ambra

    In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • SLA-Driven Data Protection Modernization: An ESG Video Interview

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • How Strong Is Your Electronic Healthcare Records Storage Strategy?

    Sponsored by: Kaminario

    In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.