ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • 2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)

    Sponsored by: IBM

    This article teaches you about next-generation IPSs which offer the best protection and response to advanced threats on endpoints and in the cloud.

  • EMC DATA PROTECTION SUITE 2015

    Sponsored by: EMC & MicroAge

    This white paper shows you how to achieve simplicity and flexibility from your data protection. Access now and learn about a simplified, integrated approach that allows your organization to become more flexible while optimizing performance and reducing costs.

  • Replacing Antivirus, and Doing it Right: A CISO Response

    Sponsored by: Sentinel Labs, Inc.

    This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.

  • EMC DATA PROTECTION SUITE 2015

    Sponsored by: EMC & NextNet

    In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.

  • Breaking Bad: The Risk of UnsecureFile Sharing

    Sponsored by: IntraLinks, Inc

    This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.

  • IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise

    Sponsored by: IBM

    This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.

  • RailCom Meets Client Needs While Ensuring Corporate Data and Device Security

    Sponsored by: IBM MaaS360

    In this case study, you will learn how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based EMM solution. Read on to discover how your business can deploy remote wipe, SIM card blocking, and more.

  • How to Mobilize your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.

  • Mobile Data Security: Finding the Balance for Secure Productivity

    Sponsored by: IBM MaaS360

    In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Securing Docker: What You Need to Know

    Sponsored by: Black Duck Software

    This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • Oracle Backup and Recovery Strategies: Moving to Data-Protection-as-a-Service

    Sponsored by: Oracle, in association with Intel

    This white paper reviews best practices for data protection approaches for backup up Oracle databases. Read on to discover how you can effectively protect your data and provide greater granularity on an application-by-application bases while reducing your RPO and RTO.

  • Open Source Security Needed in Development

    Sponsored by: Black Duck Software

    With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.

  • Gartner Market Guide for Data-Centric Audit and Protection

    Sponsored by: Imperva

    New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.

  • Secure and Manage Open Source Software

    Sponsored by: Black Duck Software

    This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.

  • Next-Generation Endpoint Security for Dummies

    Sponsored by: Carbon Black

    This e-book explains how all organizations are targeted in today's advanced threat environment. Discover how endpoints can serve as vulnerabilities to adversaries seeking to exploit your enterprise.

  • Transcript: Protecting Your Crown Jewels from Devastating Data Breaches

    Sponsored by: Lancope

    Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

  • Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.

  • Understanding Cloud Security: The AWS Shared Responsibility Model

    Sponsored by: Alert Logic

    This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.

  • AWS & Alert Logic Case Study

    Sponsored by: Alert Logic

    This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.