ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • CW Nordics August 2016

    Sponsored by: ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • Backupify for Office 365: Return of the Data

    Sponsored by: Datto, Inc.

    This e-book highlights a secure backup and recovery solution for Office 365. Discover how you can enable automatic backups and capacity planning with a backup solution that includes features such as built-in data encryption, export capabilities, compliance controls, and more.

  • Streamlining Data Backup: Recovery Manager Central ChalkTalk

    Sponsored by: NTT ICT

    How can you streamline backup and recovery for an efficient use of resources? Tune into this video to leverage centralized recovery with a converged data protection solution—combining the accelerated performance of snapshots with the dedicated protection of backup.

  • Data Protection. No Limits.

    Sponsored by: NTT ICT

    This video highlights how Marriott Resorts, Mansfield Oil, and Shields Healthcare boosted the speed at which they backup and recover sensitive data with "no limits" data protection. Tune in to discover a data backup platform that performs seamlessly across all industries.

  • "Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs

    Sponsored by: NTT ICT

    If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.

  • Converged Data Protection for Continuously Available Applications

    Sponsored by: NTT ICT

    Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.

  • Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection

    Sponsored by: NTT ICT

    This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.

  • Application-managed Data Protection for HPE 3PAR StoreServ Storage

    Sponsored by: NTT ICT

    In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.

  • Secure Your Growing Data with Disk-Based Backup and Recovery

    Sponsored by: NTT ICT

    Discover how to keep pace with rapid data growth while reducing cost and capacity requirements by leveraging disk-based backup architecture. Tune into this video to take advantage of rapid recovery and app integration, as well as software-defined data protection that removes the need for in-store dedicated backup at ROBOs.

  • Infographic: EMC Global Data Protection Index

    Sponsored by: Richardson Eyres

    EMC's global data protection index highlights the maturity of data protection approaches around the world. Discover how enterprises are faring in regards to data loss prevention and disaster recovery, and see how leaders are staying ahead of the curve when it comes to their data protection approach with cloud computing.

  • Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • 3 Steps to Create a Data Protection Lifecycle Management Strategy

    Sponsored by: Iron Mountain

    Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.

  • 4 Cybersecurity Trends that Might Be Affecting Your Organization

    Sponsored by: Navex Global

    In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.

  • Are You a Security-First Organization?

    Sponsored by: Armor

    Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.

  • Protected Health Information Data Breach Report

    Sponsored by: Verizon

    Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • Privileged Users

    Sponsored by: Forcepoint

    Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.

  • Global Data Protection Index Highlights

    Sponsored by: EMC

    EMC's Global Data Protection Index of 2016 revealed that most businesses are still unprepared for new, emerging threats. Discover the outlook of data protection strategies around the world, and learn how to prepare for the rapidly changing landscape of threats to enterprise data.

  • Are You Protected? Get Ahead of the Curve

    Sponsored by: EMC

    Explore the global readiness of enterprises in terms of their data protection, backup, and recovery solutions. Access this presentation to learn more and take advantage of valuable recommendations for modernizing your data management and protection strategies.

  • Global Data Protection Index

    Sponsored by: EMC

    Explore the readiness of companies around the world for data protection challenges brought on by cloud, big data, and mobile devices. By modernizing your data protection solutions, you can modernize your business, and achieve efficient backup and recovery. View this infographic now to learn more.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.