Research Library

Powered by

Data Loss Prevention (DLP) Research

  • Secure Pipes: Changing the Expectation of Your Internet Service Providers

    Sponsored by: Level 3 Communications, Inc.

    The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management

    Sponsored by: Dell Software

    This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.

  • Barracuda NG Firewall Model F1000

    Sponsored by: Barracuda Networks

    This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.

  • Cost of Data Breach – Impact of Business Continuity Management

    Sponsored by: IBM

    This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.

  • Get Ahead of Your Next Security Breach

    Sponsored by: Dell Software

    An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.

  • CISO Strategies to Fight Cybercrime

    Sponsored by: IBM

    This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.

  • What is Advanced Hybrid Security?

    Sponsored by: Level 3 Communications, Inc.

    Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.

  • Navigating Email Security

    Sponsored by: ZixCorp

    Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.

  • Securing Real-Time Mobile Communications

    Sponsored by: Mitel Networks Limited

    This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.

  • Customer Story: Kuwait Petroleum Corporation

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Designing an Adaptive Security Architecture for Protection From Advanced Attacks

    Sponsored by: Intel Security

    Let Gartner show you how to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to "always on" monitoring to better protect your network when perimeter defenses fail.

  • It’s Time to Get Real With SDN and NFV

    Sponsored by: Accelerated Concepts

    This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.

  • Advanced Threats: Integrating a Sandbox into your Infrastructure

    Sponsored by: Fortinet, Inc.

    Protect against advances threats with a combination of proactive mitigation, visibility and rich reporting. Learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.

  • Data Breach Investigation Report

    Sponsored by: Verizon

    This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.

  • Email Threats: Key features of an email gateway security solution

    Sponsored by: LogicNow

    What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.

  • Global IT Security Risks Survey Report

    Sponsored by: Kaspersky Lab

    This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.

  • What Is the Cost of One More Test?

    Sponsored by: Ixia

    This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.

  • The Workstation Monitoring Imperative

    Sponsored by: Intersect Alliance

    This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.

  • Data Theft Prevention The Key to Security, Growth & Innovation

    Sponsored by: Forcepoint

    This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Best Practices for Protecting Patient Data in the Cloud

    Sponsored by: Digital Guardian

    Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.

  • Stop Thinking About Your Backups: It's Time to Focus On Recovery

    Sponsored by: Dell Software

    This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.

  • Beware the Invisible Cybercriminals: Cyberespionage and Your Business

    Sponsored by: Kaspersky Lab

    Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.