ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Data Loss Prevention Best Practices for Health Care

    Sponsored by: Intel Security

    Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • The Definitive Guide to Data Loss Prevention

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts

  • Data Protection Considerations for Converged Infrastructure

    Sponsored by: Veritas

    Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.

  • George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture

    Sponsored by: Gigamon

    Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.

  • IBM Data Protection for Virtual Environments

    Sponsored by: IBM

    Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Most organizations are aware of the results of not adequately protecting their data, ranging from regulatory penalties to the detrimental costs associated with any data breach. View today's featured resource as we reveal several solutions for protecting data while reducing cost and complexity and allowing for real-time forensic analysis.

  • Complete Data Protection

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Plus learn how to implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • IDC: Protecting Your SaaS Applications

    Sponsored by: TrendMicro

    Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.

  • Moving from Monitoring to Blocking Content - 5 Best Practices

    Sponsored by: Intel Security

    Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.

  • Protect Company Data with Encryption & Remote Management

    Sponsored by: Intel Security

    Simplify enterprise security management with broad, centralized control and stronger, more efficient options for protecting endpoints. View now to stay ahead of emerging threats with proven TCO-friendly solutions that lock down endpoints and keep data secure without dragging down user or mobile-workforce productivity.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • Five Tips to Help Protect Your Data - From passive monitoring to proactive protection

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Is data leaking out on your watch?

    Sponsored by: Intel Security

    Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim (whether it be from external threats or your very own employees).

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

  • A Best Practice Approach to Database Backup and Recovery

    Sponsored by: Veritas

    Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.

  • A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization

    Sponsored by: Gemalto

    Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Ten ways to save money with IBM data protection

    Sponsored by: IBM

    Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.