ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Future-Proof Your Identity Management in the Cloud

    Sponsored by: Rackspace

    Explore how a solid IAM strategy, coupled with a fully managed service, allows you to provide your end users with a single username and password across cloud, on-premises IT, and 3rd party apps like Office 365 and Salesforce.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • The Security Performance of 6 Key Industries

    Sponsored by: BitSight

    Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.

  • 40 Questions You Should Have in Your Vendor Security Assessment

    Sponsored by: BitSight

    In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Why Laptop Security Cannot Wait

    Sponsored by: Commvault

    This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.

  • Overcome Office 365 Security and Archiving Challenges

    Sponsored by: Proofpoint, Inc.

    Discover the limitations of Office 365's built in security features and how you can augment your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.

  • Replacing Antivirus, and Doing it Right: A CISO Response

    Sponsored by: Sentinel Labs, Inc.

    This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.

  • IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise

    Sponsored by: IBM

    This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Transcript: Protecting Your Crown Jewels from Devastating Data Breaches

    Sponsored by: Lancope

    Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

  • Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.

  • Understanding Cloud Security: The AWS Shared Responsibility Model

    Sponsored by: Alert Logic

    This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.

  • AWS & Alert Logic Case Study

    Sponsored by: Alert Logic

    This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell, Inc. and Intel®

    This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell, Microsoft and Citrix

    This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Don't Believe the Hype - All Containers are Not Equal

    Sponsored by: Good Technology

    This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.