ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Preserving Agility with Data Recovery in the Cloud

    Sponsored by: Commvault

    This white paper highlights a cloud-based data management solution that can deliver enterprise-grade protection, while not only preserving your organization's current agility but also extending it to backup and disaster recovery operations. Read on here to key into how to ensure business continuity via a hybrid cloud.

  • Data Breach Readiness 2.0

    Sponsored by: ComputerWeekly.com

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

  • High Availability is not a Luxury: How to Eliminate Downtime

    Sponsored by: arcserve

    It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.

  • Tactics to combat insider threat

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • Don't Believe the Hype - All Containers are Not Equal

    Sponsored by: Good Technology

    This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.

  • Bolster Your DLP Systems for Safer File Sharing and Collaboration

    Sponsored by: FinalCode

    In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.

  • State of File Collaboration Security

    Sponsored by: FinalCode

    Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.

  • How to Virtualize Disaster Recovery with Cloud Computing

    Sponsored by: IBM

    This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.

  • Linking Resiliency to Business Objectives: How To Make a Case For Corporate Investment

    Sponsored by: IBM

    This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.

  • Security Report Card: Do You Meet NIST Standards?

    Sponsored by: LogRhythm, Inc.

    The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.

  • Is it time for a DLP system in your enterprise?

    Sponsored by: SearchSecurity.com

    Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.

  • Case Study: Catching Virtual Thieves

    Sponsored by: Prelert

    In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.

  • Protecting Against Web Application Threats Using SSL

    Sponsored by: Symantec Website Security Solutions

    In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.

  • Get the Upper Hand on Virtual Machine Sprawl

    Sponsored by: SearchServerVirtualization

    As hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.

  • Data Loss Prevention: Decision Time

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: RFP Technology Decisions

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: From Business Problem to Technical Solution

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Seven Keys to Securing Your Growing Business

    Sponsored by: Sophos, Inc.

    This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.

  • Best Practices for a Secure Mobile Workforce

    Sponsored by: Accellion, Inc.

    Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • What's New in Symantec Data Loss Prevention

    Sponsored by: Symantec Corporation

    This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.