ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • A Step-By-Step Guide to Finding the Right Data Protection System

    Sponsored by: Gemalto

    Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.

  • Five New Rules for Enterprise File Sync and Share Service Providers

    Sponsored by: Citrix

    New rules for EFSS providers have been put in place that provide security benefits to customer data while restricting access of files to EFSS providers. Access this resource to learn these 5 new rules, and how your EFSS provider should be reacting.

  • Security and availability in extremely adverse environments

    Sponsored by: Barracuda Networks

    Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • 8 Key Functions to Prevent Data Loss with User Behavior

    Sponsored by: Exabeam

    User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.

  • 5-Step Guide For GDPR Compliance

    Sponsored by: Druva Software

    The GDPR is about the rules that companies must follow to ensure they are protecting PII. This white paper shows you a 5-point plan to prepare your systems to meet the new needs of GDPR data protection regulations by 2018.

  • Data Restoration Services: Vendor Guide for IT

    Sponsored by: Iron Mountain

    Discover a data restoration solution that eliminates resource-consuming legacy systems while still providing access to archived data. Access now to discover the benefits this solution can provide to your enterprise, including reduced data center power/cooling costs, faster responses to restore requests, consolidated silos of tape, and more.

  • Making the Case for Cloud-to-Cloud Backup

    Sponsored by: Datto, Inc.

    Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • A Secure Alternative to Personal File Sharing Services in the Enterprise

    Sponsored by: Citrix

    Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.

  • The Demand for Hybrid Online File Sharing

    Sponsored by: Citrix

    In this report, learn how the OFS market is changing and uncover critical insight into the adaptions that must be made to keep clients happy. Read on to uncover why so many businesses want their OFS vendor offerings to include greater choice with how data is stored and where.

  • Top 5 requirements for secure enterprise file sync and sharing

    Sponsored by: Citrix

    The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.

  • Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add

    Sponsored by: VMware

    Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • ShareFile Enterprise: Provide Industry-leading Security

    Sponsored by: Citrix

    Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

  • DLP and EFSS: Is your data safe?

    Sponsored by: Citrix

    You can't afford to let data loss prevention (DLP) take a backseat when it comes to secure file sync and sharing. Discover how advanced security features address and integrate DLP, how to protect your corporate data from unauthorized sharing, and more.

  • How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management

    Sponsored by: One Identity

    This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.

  • Controlling Data Center Security

    Sponsored by: Barracuda Networks

    Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.

  • Get Ahead of Your Next Security Breach

    Sponsored by: One Identity

    An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.

  • Navigating Email Security

    Sponsored by: ZixCorp

    Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.

  • Customer Story: Kuwait Petroleum Corporation Needed Control of Company Data Sharing

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Data Breach Investigation Report

    Sponsored by: Verizon

    This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.