ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • Mobile security strategy: Getting it right from the beginning

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • 5 Tips to Help Protect Your Data

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    New rules for EFSS providers have been put in place that provide security benefits to customer data while restricting access of files to EFSS providers. Access this resource to learn these 5 new rules, and how your EFSS provider should be reacting.

  • Data Restoration Services: Vendor Guide for IT

    Sponsored by: Iron Mountain

    Discover a data restoration solution that eliminates resource-consuming legacy systems while still providing access to archived data. Access now to discover the benefits this solution can provide to your enterprise, including reduced data center power/cooling costs, faster responses to restore requests, consolidated silos of tape, and more.

  • Making the Case for Cloud-to-Cloud Backup

    Sponsored by: Datto, Inc.

    Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.

  • A Secure Alternative to Personal File Sharing Services in the Enterprise

    Sponsored by: Citrix

    Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.

  • The Demand for Hybrid Online File Sharing

    Sponsored by: Citrix

    In this report, learn how the OFS market is changing and uncover critical insight into the adaptions that must be made to keep clients happy. Read on to uncover why so many businesses want their OFS vendor offerings to include greater choice with how data is stored and where.

  • Top 5 requirements for secure enterprise file sync and sharing

    Sponsored by: Citrix

    The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.

  • Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add

    Sponsored by: VMware

    Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.

  • ShareFile Enterprise: Provide Industry-leading Security

    Sponsored by: Citrix

    Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

  • Customer Story: Kuwait Petroleum Corporation Needed Control of Company Data Sharing

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Email Threats: Key Features of an Email Gateway Security Solution

    Sponsored by: LogicNow

    Learn the key features of an email gateway, get an overview of the changing face of email threats, and discover how you can start effectively protecting your enterprise's email today. Access this white paper to learn more about email security for mid-sized businesses, the solutions available, and what features these organizations cannot do without.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Best Practices for Protecting Patient Data in the Cloud

    Sponsored by: Digital Guardian

    Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.

  • Streamline Data Security Management

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP)

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    What steps should you take to best protect your virtualized cloud data? Find out inside.

  • How to Evaluate Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.