ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Best Practices For Public Cloud Security

    Sponsored by: TrendMicro

    This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.

  • Gartner: Magic Quadrant for Mobile Data Protection

    Sponsored by: Digital Guardian

    Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.

  • Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats

    Sponsored by: Digital Guardian

    In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.

  • Gartner Competitive Landscape: Endpoint Detection & Response (EDR)

    Sponsored by: Digital Guardian

    In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.

  • Gartner Competitive Landscape: Data Loss Prevention Market 2015

    Sponsored by: Digital Guardian

    In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.

  • Improving Converged BC and DR Through Data Loss Prevention Best Practices

    Sponsored by: Oracle Corporation

    Access this expert e-guide to gain best practices for data loss prevention so that your enterprise can thwart potential threats from disrupting your business continuity and disaster recovery (DR) operations. As a bonus, you will also learn how server virtualization has allowed data backups and DR to converge.

  • Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention

    Sponsored by: Digital Guardian

    Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.

  • 8 Noble Truths of Backup and Recovery

    Sponsored by: Acronis

    This white paper provides eight guidelines for successful backup and recovery. Access now and learn how to effectively protect your data and prevent data loss after a potential disaster.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Migrating Your Company's PCs: Best Practices and Tips

    Sponsored by: Acronis

    This white paper provides best practices and guidelines for ensuring your backup systems are prepared when migrating current, outdated PC fleet to new PCs, laptops, and tablets. Read on to learn how an efficient, reliable backup solution can allow you to migrate to new PCs smoothly and successfully.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks

    Sponsored by: SurfWatch Labs

    This white paper illustrates the latest trends in the cyber risk landscape showing how unencrypted computers and other devices plague IT. Continue reading to learn why you can't afford to ignore data and device encryption.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Data Protection with Zero Data Loss Recovery Appliance

    Sponsored by: Oracle Corporation

    This brief white paper highlights an Oracle data loss recovery appliance that delivers data protection-as-a-service and accelerates database performance. Read on to see how this self-contained solution can enable your enterprise to recover quickly and benefit from less downtime and data loss.

  • A Guide to Advanced Threat Detection for Sensitive Enterprise IP

    Sponsored by: Interset Software Inc.

    In this white paper, you will explore the unique challenges of protecting critical enterprise data and examine a holistic approach to protecting your sensitive data that utilizes advanced behavioral analytics to safeguard your high-value IP.

  • Real-World Data Breach Protection Techniques

    Sponsored by: Intel

    This white paper examines the importance of data loss prevention (DLP) in today's advanced cybercrime environment. Read on to learn how you can implement effective DLP and keep your data out of hackers' hands.

  • How to Improve on Your Current Email Security

    Sponsored by: Proofpoint, Inc.

    This webcast explores some of the options available to you for improving and strengthen your email security. Access it and learn how you can build on current email security measures by adding advanced encryption, threat intelligence, and more.

  • Making the Executive Case for Cloud to Cloud Backup

    Sponsored by: Datto, Inc.

    This essential e-book outlines scenarios explaining the relevance and necessity of cloud to cloud backup, highlighting financial benefits, operational benefits, legal benefits, and more. Read on to see how every aspect of your business can benefit from cloud backup by providing you with the ultimate data protection in the event of a data loss.

  • Data Loss Nightmares of a Salesforce.com Admin

    Sponsored by: Datto, Inc.

    This white paper discusses 5 common nightmares every organization has regarding their data protection and the threat of a data loss. Read on to discover how to manage your data with an automatic cloud-to-cloud backup solution that will ensure your data is secure.

  • The Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.

  • Getting Back to the Future When Disaster Strikes

    Sponsored by: Datto, Inc.

    This white paper discusses how to secure your data in the cloud with cloud backup technology and provides 12 tips for successful data backup. Access now to see how implementing a reliable, documented back up program can ensure you avoid a data loss and keep your data secure.

  • Cloud-Based BCDR: The Transformative Technical Foundations

    Sponsored by: NaviSite, Inc.

    In this white paper, you will discover the technical foundations you need to put in place in order to execute successful cloud-based BCDR. Read on to meet the new realities of BCDR in your enterprise and learn how to implement a stellar business resilience plan.

  • Resiliency in the Cloud

    Sponsored by: IBM

    This white paper discusses the reality of cloud resilience and how you can take a structured approach to cloud resiliency. Download now to learn four key steps to plan and manage cloud resiliency.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.