ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP)Research

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    Sponsored by: ComputerWeekly.com

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

  • The Data Recovery Workbook

    Sponsored by: Iron Mountain

    This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started!

  • Backup and Recovery Requirements for Business-Critical Applications

    Sponsored by: SearchStorage.com

    In this e-guide, learn strategies to determine what data is considered most important. Also, read about the different ways to select and establish an effective backup policy to ensure essential data is properly monitored.

  • Enterprises Have Room for Improvement in Secure IT Asset Disposition

    Sponsored by: Iron Mountain

    Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.

  • Endpoint Security IT Decision Center Handbook 2

    Sponsored by: SearchSecurity.com

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

  • Mobility is here to stay – Is your data is backed up?

    Sponsored by: SearchDataBackup.com

    Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.

  • Top 10 Backup Challenges and Expert Recommendations to Address Them

    Sponsored by: SearchStorage.com

    This e-guide reports today's top backup challenges companies are struggling to address and explains how erasure coding, object storage, and other innovative approaches can eliminate the need to restore, enabling instant recovery instead. Read on now to learn more.

  • Paying a Fair Price for Data Backup

    Sponsored by: Asigra

    This informative paper explores a new enterprise backup licensing model based on recovery. Discover how this approach ensures you're paying a fair price for your data backup and recovery and protects your information, no matter what. Read on now to learn more.

  • Backup to the Cloud is Still Cloudy

    Sponsored by: ExaGrid Systems, Inc.

    This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.

  • CIO Decisions E-Zine: The New BPM

    Sponsored by: SearchCIO.com

    Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge.

  • Dealing with Data Growth: Storage and Backup Strategies

    Sponsored by: Simplify IT

    This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.

  • Enterprise Resiliency & Application Recovery

    Sponsored by: SunGard Availability Services

    When disaster strikes, your IT information and data is compromised. This side-by-side case study outlines how East Coast University and a medical center in NYC helped weather hurricane sandy and maintain IT availability.

  • The Past, Present, and Future of RAID Data Protection

    Sponsored by: SearchCloudStorage.com

    In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.

  • For Secure Access, Passwords Alone Do Not Work

    Sponsored by: Verizon

    This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.

  • Safeguarding Business in a Time of Expanding and Evolving Cyber Threats

    Sponsored by: Verizon

    This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.

  • Optimize Your Network with Dell and Silver Peak and Reap the Benefits

    Sponsored by: Dell and Microsoft

    This informative paper explores a partnership that addresses today's consolidation, backup, replication and unified communications. Discover how this cost effectively increase network capacity, optimize network quality, and help ensure maximum performance over distance—all while helping to reduce ongoing IT operating costs. Read on to learn more.

  • Retailer stays number one with enhanced IT support

    Sponsored by: Dell, Inc.

    This informative paper explores how one organization easily and affordably implemented these modern technologies to keep up in today's fast-paced and virtualized landscape. Read on to learn about the benefits they now enjoy.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • Why Upgrade to NetBackup 5230 and 5030 Appliances?

    Sponsored by: DLT Solutions

    This informative resource examines a modernized backup approach with expandable storage and end-to-end data protection for physical and virtual environments. Read on to discover more.

  • Symantec NetBackup Appliances: Key Factors in Modernizing Backup and Recovery

    Sponsored by: DLT Solutions

    This informative paper explores considerations to take into account when looking to modernize your backup and recovery initiatives. Read on to learn more.

  • What's New with Symantec NetBackup Appliances

    Sponsored by: DLT Solutions

    This informative paper examines what's new in the realm of backup appliances and explores how today's IT pros are changing the way they backup and recover virtual and physical environments. Read on now to learn more.

  • Tech Brief (FAQ): Windows Server 2012 Recycle Bin

    Sponsored by: Dell Software

    Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper

  • Endpoint Security Technology

    Sponsored by: Symantec Corporation

    Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.

  • Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ

    Sponsored by: Symantec Corporation

    This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.

  • WatchGuard- Data Loss Prevention

    Sponsored by: WatchGuard Technologies, Inc.

    This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.