ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • What is "Shadow IT" and How to Reduce It

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.

  • 10 Reasons You Should Consider Commvault for Data Protection

    Sponsored by: Commvault

    Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • How to Save Storage Space with Purposeful Backups

    Sponsored by: Veeam Software

    Discover how to effectively reduce storage capacity when performing backups by combining the strategies outlined here for flexible and powerful data protection. Based on your needs, learn when you should prioritize SLA over storage (and vice versa), best practices when backing up to tape, and more.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Healthcare Data Privacy: 5 Basic Steps to Secure Your Patient Records

    Sponsored by: Xerox

    Discover 5 basic steps to securing EHRs and enacting robust patient information protection. Additionally, get tips on re-thinking your cyber incident response plan to account for new and increasing forms of ransomware that attempt to attack and impact the reputation of your organization.

  • As Healthcare Data Expands, So Should Security

    Sponsored by: Xerox

    Access this post to learn how to ensure data integrity and promote population health management (PHM) initiatives without sacrificing HIPAA compliance.

  • Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security

    Sponsored by: Absolute

    Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • Plan for Disaster Recovery Based on Specific Threat Considerations

    Sponsored by: LogicNow

    Benjamin Franklin's adage 'an ounce of prevention is worth a pound of cure' holds true for disaster recovery scenarios. Being proactive is better than being reactive. Download this e-book to access 5 key questions to ask yourself when planning and future-proofing your disaster recovery strategies.

  • How to Choose the Right Disaster Recovery Solution

    Sponsored by: LogicNow

    In this e-book, you will learn how to formulate tactical backup and recovery by considering the possible disasters, matching them with the data sets to be protected, and identifying key recovery objectives. Read on to build a DR solution requirements list that specifically matches your organization's needs.

  • Security & Compliance Are No Gamble

    Sponsored by: Armor

    Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Database Audit and Protection Tips

    Sponsored by: Imperva

    Discover an actionable set of tips for organizations looking to implement a data-centric security strategy that addresses database audit and protection. Get tangible data security benefits while simplifying the compliance audit process.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

  • Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage

    Sponsored by: Dell EMC

    David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.