ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • FBI Cyber Squad Guest Speaking on Emerging Cyber Threats

    Sponsored by: Digital Shadows

    Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.

  • Backup for Office 365: SharePoint Demo

    Sponsored by: Spanning Cloud Apps

    Data loss happens to everyone. It hurts the most when it happens to mission-critical data, but it isn't a big deal when you have appropriate backups in place. This 3 minute video demonstrates how you can quickly find and restore lost SharePoint data directly into Office 365, as well as automate backup and recovery.

  • Why Organizations Still Struggle To Digitally Transform & Innovate

    Sponsored by: Veeam Software

    An overwhelming majority are struggling with availability and protection gaps, which are leading to data loss, impeded operating environments, and delayed digital transformation efforts. Access this report for survey results on how organizations struggle to bridge these gaps and ways you can cross them.

  • A Secure, IT-Approved File Sharing Alternative to Shadow IT

    Sponsored by: Citrix

    Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.

  • Why Data Protection Is the Cornerstone of Modern Enterprise Security

    Sponsored by: Symantec

    According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.

  • Why Availability Beats Legacy Backup

    Sponsored by: Veeam Software

    More than half of the world's largest companies have turned their back on legacy backup systems and made the move to availability. Here are the top ten reasons why organizations are making the switch.

  • Why You Need to Include the Cloud in Your Disaster Recovery Plan

    Sponsored by: StorageCraft Technology Corporation

    Oftentimes, onsite backups aren't enough to restore data loss. In this resource, you'll learn the role cloud backups should play in your DR plan. Access now to see how replicating to purpose-built cloud DR will allow you to flip a switch and failover to a secondary network running in the cloud in just minutes.

  • Recovering your Company's PCs Affected by Ransomware

    Sponsored by: Acronis

    After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.

  • Leading Health Insurer Scales Security across More than 2500 Databases

    Sponsored by: Trustwave

    Mitigating database security threats and meeting compliance requirements can be difficult. Check out this case study to uncover how one health insurer streamlined its database security and compliance efforts, helping them save time and money.

  • Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value

    Sponsored by: Rubrik

    Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • A Computer Weekly Buyer's Guide to EU General Data Protection

    Sponsored by: ComputerWeekly.com

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

  • Availability and Risk Avoidance for the Software-Defined Data Center

    Sponsored by: Veeam Software

    Users demand access to information and applications at any given time from anywhere and any device, without tolerance for downtime or data loss. Access this white paper to learn how to keep your software-defined data center up and running at all times with backup and replication that won't leave you in the dark like legacy tools.

  • Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery

    Sponsored by: QuorumLabs Inc.

    Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.

  • Data Breaches: Is Prevention Practical?

    Sponsored by: Palo Alto Networks

    Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.

  • Resource Center: How to Safeguard Data

    Sponsored by: McAfee, Inc.

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Shadow IT Guide: Protect Data and Avoid Compliance Violations

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations

    Sponsored by: Websense, Inc.

    Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.

  • Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup

    Sponsored by: Unitrends

    Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.

  • When Cyberthieves Attack, Technologies Have Your Back

    Sponsored by: SearchHealthIT.com

    Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.