ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP)Research

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

  • Endpoint Protection Platforms for Enterprises

    Sponsored by: Symantec Corporation

    This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.

  • 2013 Fourth Annual Cost of Cyber Crime Study

    Sponsored by: Hewlett-Packard Limited

    This guide explores the state of cybercrime in today's IT landscape and provides global statistics on the high costs of security breaches.

  • How to Steal 60 Million Dollars in 60 Seconds

    Sponsored by: Hewlett-Packard Limited

    This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.

  • Protecting Data and Enabling the Mobile Enterprise

    Sponsored by: Hewlett-Packard Limited

    This guide explores best practices for adopting and securing mobility in the workplace, as well as the importance of data protection.

  • Computer Weekly buyer’s guide to Windows XP support

    Sponsored by: ComputerWeekly.com

    Microsoft will end technical support for its Windows XP operating system in April 2014. Computer Weekly looks at what this means for those businesses that have yet to migrate to newer alternatives.

  • IT Priorities 2014: UK Europe, France and Germany

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

  • Take 6 steps to know that your data is safely stored

    Sponsored by: Iron Mountain

    This informative workbook delves into key elements you need to master to ensure you know where your data is at any given time and where it is going. Read on now to discover five key steps for protecting your business data and get started.

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    Sponsored by: ComputerWeekly.com

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

  • The Data Recovery Workbook

    Sponsored by: Iron Mountain

    This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started!

  • Backup and Recovery Requirements for Business-Critical Applications

    Sponsored by: SearchStorage.com

    In this e-guide, learn strategies to determine what data is considered most important. Also, read about the different ways to select and establish an effective backup policy to ensure essential data is properly monitored.

  • Enterprises Have Room for Improvement in Secure IT Asset Disposition

    Sponsored by: Iron Mountain

    Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.

  • Endpoint Security IT Decision Center Handbook 2

    Sponsored by: SearchSecurity.com

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

  • Mobility is here to stay – Is your data is backed up?

    Sponsored by: SearchDataBackup.com

    Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.

  • Top 10 Backup Challenges and Expert Recommendations to Address Them

    Sponsored by: SearchStorage.com

    This e-guide reports today's top backup challenges companies are struggling to address and explains how erasure coding, object storage, and other innovative approaches can eliminate the need to restore, enabling instant recovery instead. Read on now to learn more.

  • Why Leaks Matter

    Sponsored by: Lumeta Corporation

    This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.

  • Backup to the Cloud is Still Cloudy

    Sponsored by: ExaGrid Systems, Inc.

    This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.

  • CIO Decisions E-Zine: The New BPM

    Sponsored by: SearchCIO.com

    Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge.

  • Dealing with Data Growth: Storage and Backup Strategies

    Sponsored by: Simplify IT

    This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.

  • Enterprise Resiliency & Application Recovery

    Sponsored by: SunGard Availability Services

    When disaster strikes, your IT information and data is compromised. This side-by-side case study outlines how East Coast University and a medical center in NYC helped weather hurricane sandy and maintain IT availability.

  • The Past, Present, and Future of RAID Data Protection

    Sponsored by: SearchCloudStorage.com

    In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.

  • For Secure Access, Passwords Alone Do Not Work

    Sponsored by: Verizon

    This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.

  • Safeguarding Business in a Time of Expanding and Evolving Cyber Threats

    Sponsored by: Verizon

    This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.

  • Optimize Your Network with Dell and Silver Peak and Reap the Benefits

    Sponsored by: Dell and Microsoft

    This informative paper explores a partnership that addresses today's consolidation, backup, replication and unified communications. Discover how this cost effectively increase network capacity, optimize network quality, and help ensure maximum performance over distance—all while helping to reduce ongoing IT operating costs. Read on to learn more.

  • Retailer stays number one with enhanced IT support

    Sponsored by: Dell, Inc.

    This informative paper explores how one organization easily and affordably implemented these modern technologies to keep up in today's fast-paced and virtualized landscape. Read on to learn about the benefits they now enjoy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.