ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • The Demand for Hybrid Online File Sharing Solutions

    Sponsored by: Citrix

    Learn about the overwhelming need for online file sharing and collaboration (OFS) solutions, approaches being taken to providing alternative solutions, and what is prompting so many enterprises to search for the solution that best suits their needs.

  • Top 5 requirements for secure enterprise file sync and sharing

    Sponsored by: Citrix

    The mobile data access challenge poses both risk and opportunities for IT. This resource highlights an enterprise ready file sync and sharing solution that provides the user experience employees want and the advanced security features required by IT.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • ShareFile Enterprise Security White Paper

    Sponsored by: Citrix

    Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

  • Secure Pipes: Changing the Expectation of Your Internet Service Providers

    Sponsored by: Level 3 Communications, Inc.

    The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management

    Sponsored by: One Identity

    This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.

  • Controlling Data Center Security

    Sponsored by: Barracuda Networks

    Discover how to centrally control your data center security system to prevent it from weakening over time. Learn how central controls will allow you to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.

  • Get Ahead of Your Next Security Breach

    Sponsored by: One Identity

    An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.

  • What is Advanced Hybrid Security?

    Sponsored by: Level 3 Communications, Inc.

    Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.

  • Navigating Email Security

    Sponsored by: ZixCorp

    Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.

  • Customer Story: Kuwait Petroleum Corporation

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Designing an Adaptive Security Architecture for Protection From Advanced Attacks

    Sponsored by: Intel Security

    Let Gartner show you how to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to "always on" monitoring to better protect your network when perimeter defenses fail.

  • It’s Time to Get Real With SDN and NFV

    Sponsored by: Accelerated Concepts

    This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.

  • Advanced Threats: Integrating a Sandbox into your Infrastructure

    Sponsored by: Fortinet, Inc.

    Protect against advances threats with a combination of proactive mitigation, visibility and rich reporting. Learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.

  • Data Breach Investigation Report

    Sponsored by: Verizon

    This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.

  • Email Threats: Key features of an email gateway security solution

    Sponsored by: LogicNow

    What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.

  • The Workstation Monitoring Imperative

    Sponsored by: Intersect Alliance

    This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Stop Thinking About Your Backups: It's Time to Focus On Recovery

    Sponsored by: Dell Software

    This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.

  • IBM Security Guardium Vulnerability Assessment

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    What steps should you take to best protect your virtualized cloud data? Find out inside.

  • IBM 2015 Cyber Security Intelligence Index for Information and Communication

    Sponsored by: IBM

    This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.

  • Best Practices for Protecting Patient Data in the Cloud

    Sponsored by: Digital Guardian

    Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.