ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Case Study: Disc Comfort Fuses Image Management with athenahealth

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.

  • Case Study: CareWell Streamlines Patient Journey & Reduces Risk

    Sponsored by: Ambra

    Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.

  • The New World of Unified Image Management in Healthcare

    Sponsored by: Ambra

    In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.

  • Achieving Maximum Backup Granularity

    Sponsored by: Veeam Software

    Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: Hewlett-Packard Enterprise

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • CW Nordics August 2016

    Sponsored by: ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • "Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs

    Sponsored by: Hewlett-Packard Enterprise

    If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.

  • Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Masergy UES Offers Unique Approach to Network Defense

    Sponsored by: MASERGY

    Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • Mobile security strategy: Getting it right from the beginning

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • 5 Tips to Help Protect Your Data

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • How Strong Is Your Electronic Healthcare Records Storage Strategy?

    Sponsored by: Kaminario

    In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • Secure Hosting Creates Foundation for Innovative Telemedicine

    Sponsored by: BT

    In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Discover how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.