ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • CW Nordics August 2016

    Sponsored by: ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • SQL Server: Data Best Practices

    Sponsored by: Tegile, a Western Digital brand

    Download this guide to learn how to avoid the common pitfalls of deploying and maintaining SQL Server and accommodate the most demanding workloads by integrating all-flash for accelerated database performance. Additionally, learn how to leverage the SAN array and database engine for effective data replication, transaction log backup, and DR.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.

  • Get Ahead of Your Next Security Breach

    Sponsored by: One Identity

    Uncover five steps you can take to protect your organization from the inherent risks of privileged accounts, preventing their malicious use by hackers and insider threats.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

  • How Strong Is Your Electronic Healthcare Records Storage Strategy?

    Sponsored by: Kaminario

    In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • Secure Hosting Creates Foundation for Innovative Telemedicine

    Sponsored by: BT

    In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Discover how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Masergy UES Offers Unique Approach to Network Defense

    Sponsored by: MASERGY

    Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • Controlling Data Center Security

    Sponsored by: Barracuda Networks

    Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.

  • Next-Generation IPS in the Era of Targeted Attacks

    Sponsored by: IBM

    This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.