ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Network security stack: How and why to consider adding new layers

    Sponsored by: OpenDNS

    This e-book teaches you about new tools to fully protect your employees wherever they go. Discover a cloud-delivered security that shores up your defenses and gets in front of attacks even as they increase in sophistication.

  • MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments

    Sponsored by: Vision Solutions

    In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.

  • Cyber Liability: Risks, Ramifications, and Mitigation

    Sponsored by: eSentire

    Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.

  • Develop a strong IAM strategy for third-party vendors

    Sponsored by: Radiant Logic, Inc.

    This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.

  • Operationalizing Data Governance with Living Metadata

    Sponsored by: ERwin

    This white paper teaches you the importance of updating and reviewing your organization's metadata regularly. Explore best practices in maintaining "living" metadata platforms.

  • Top 10 Reasons to Select CA ERwin® Modeling

    Sponsored by: ERwin

    This white paper shows you 10 reasons why you should use a data model to manage your multiple data sources.

  • Buyer’s Guide to Enterprise Collaboration Solutions

    Sponsored by: IntraLinks, Inc

    This white paper will help you collaborate with potential security providers and vendors when performing due diligence in choosing your right solution. Access now to learn how you can get end-to-end visibility as your data travels through complex networks.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.

  • How to Secure Health Records on the Screen

    Sponsored by: OptioLabs

    This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.

  • Solving Data Protection: HGST Active Archive System & Commvault Value of Data Protection at Scale

    Sponsored by: HGST

    This white paper shows you how to meet a variety of your organization's demands including software to manage data and a target storage system with the ability to ensure integrity, scale and high availability. Access now to learn how you can simplify your data security.

  • Protect Your Computer Screen With OptioLabs' OptioAware

    Sponsored by: OptioLabs

    In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.

  • The Human Factor Report

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

  • Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction

    Sponsored by: OptioLabs

    This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.

  • Case Study: Financial Services Firm Implements Cloud DRaaS

    Sponsored by: Cirrity

    This case study highlights how one financial services firm was able to prevent loss of revenue after a disaster occurred by implementing a cloud disaster recovery as a service (DRaaS) solution. Read on and discover how this DRaaS platform can enable a safer and more scalable data storage system and complete disaster recovery solution.

  • Privacy Shield: The New Data Transfer Agreement

    Sponsored by: UKFast

    In this white paper, you will learn how to take advantage of cloud versatility, best-of-breed technology and enterprise-grade infrastructure without opening up customer data to the uncertainties of global entangled hosting infrastructures.

  • Building a Business Case for Cyber Threat Intelligence

    Sponsored by: SurfWatch Labs

    This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.

  • Demo of OptioAware by OptioLabs

    Sponsored by: OptioLabs

    View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.

  • Today's Most Valuable Commodity is Located in Cyberspace

    Sponsored by: Digital Guardian

    This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.

  • Webinar - Network security without compromise

    Sponsored by: Aruba Networks

    In this webcast, you will learn how to enhance network security, enforcement and a better user experience.

  • Determining the True Costs of a Data Breach

    Sponsored by: Dell SecureWorks

    This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.

  • Data Governance: The True Key to Effective Risk Management

    Sponsored by: Guidance Software, Inc.

    In this eguide, you will learn the real importance of information governance. It's much more than keeping track of digital records for compliance reasons. Discover how to build classification tools and functional descriptive data into our digital assets so they can be accessed for business with increased efficiency.

  • Why Virtualization Has Permanently Changed Enterprise Computing

    Sponsored by: NEC/INTEL

    In this resource, discover a server customized for fault-tolerant virtualization and which promises to deliver your enterprise IT 99.999% system uptime. Learn how to dramatically simplify application deployment with this server, as well as enact operational simplicity by eliminating clusters and external SAN-attached storage.

  • Fault Tolerance Ease of Setup Comparison Guide

    Sponsored by: NEC/INTEL

    This white paper compares two fault tolerant solutions – a hardware vs. a software solution - to determine which one is easier to set up. Learn which one required 36.6% fewer steps and needed fewer components.

  • Demo: Oracle Zero Data Loss Recovery Appliance

    Sponsored by: Oracle, in association with Intel

    This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.

  • Oracle's Zero Data Loss Recovery Appliance

    Sponsored by: Oracle, in association with Intel

    This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.