ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Ten ways to save money with IBM data protection

    Sponsored by: IBM

    Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    In today's connected world, all of your company's data needs to be managed, visualized and integrated into business processes to secure the future of your digital ecosystem. Learn how to best protect the giant influx of complex data flow and monitor this data end-to-end as it flies through your ecosystem.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Understanding How IBM Spectrum Protect Enables Hybrid Data Protection

    Sponsored by: IBM

    Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.

  • What You Want To Know (But Haven’t Asked) About Micro-Segmentation

    Sponsored by: VMware

    Perimeter security is no longer enough to meet data center security requirements. Micro-segmentation is an important security aspect that you need to fully understand. Explore this technical brief to learn about facets of micro-segmentation that many resources don't cover.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.

  • Practical Guide to IT Security Breach Prevention Part II

    Sponsored by: Kaspersky Lab

    With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.

  • Security and availability in extremely adverse environments

    Sponsored by: Barracuda Networks

    Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • Prevent Data Loss with Exabeam

    Sponsored by: Exabeam

    User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.

  • Gartner Magic Quadrant for Enterprise Data Loss Prevention

    Sponsored by: Intel Security

    This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.

  • Stop Data Exfiltration

    Sponsored by: Intel Security

    Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.

  • 5-Step Guide For GDPR Compliance

    Sponsored by: Druva Software

    This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.

  • Securing Office 365 with Symantec

    Sponsored by: Symantec Corporation

    How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.

  • Symantec Data Loss Prevention for Cloud

    Sponsored by: Symantec Corporation

    Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.

  • Data Restoration Services: Vendor Guide for IT

    Sponsored by: Iron Mountain

    Discover a data restoration solution that eliminates resource-consuming legacy systems while still providing access to archived data. Access now to discover the benefits this solution can provide to your enterprise, including reduced data center power/cooling costs, faster responses to restore requests, consolidated silos of tape, and more.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • A New Approach to Data Center Security

    Sponsored by: VMware

    Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.

  • A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

    Sponsored by: Citrix

    Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.

  • The Demand for Hybrid Online File Sharing Solutions

    Sponsored by: Citrix

    Learn about the overwhelming need for online file sharing and collaboration (OFS) solutions, approaches being taken to providing alternative solutions, and what is prompting so many enterprises to search for the solution that best suits their needs.

  • Top 5 requirements for secure enterprise file sync and sharing

    Sponsored by: Citrix

    The mobile data access challenge poses both risk and opportunities for IT. This resource highlights an enterprise ready file sync and sharing solution that provides the user experience employees want and the advanced security features required by IT.

  • Making the Case for Cloud-to-Cloud Backup

    Sponsored by: Datto, Inc.

    Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.