ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • How to Evaluate Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Stop the Bad Guys Cold: Securing Your Mobile Data

    Sponsored by: Commvault

    This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.

  • Next-Generation IPS in the Era of Targeted Attacks

    Sponsored by: IBM

    This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.

  • Why The Weakest Link in Security Is All Of Us

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

  • Today's Most Valuable Commodity is Located in Cyberspace

    Sponsored by: Digital Guardian

    This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.

  • Determining the True Costs of a Data Breach

    Sponsored by: Dell SecureWorks

    This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • Vendor Comparison: Intrusion Prevention Systems (IPS )

    Sponsored by: IBM

    This report by Gartner compares intrusion prevention systems (IPSs) in the market today. Uncover the strengths and cautions of the leaders, challengers, niche players, and visionaries.

  • Future-Proof Your Identity Management in the Cloud

    Sponsored by: Rackspace

    Explore how a solid IAM strategy, coupled with a fully managed service, allows you to provide your end users with a single username and password across cloud, on-premises IT, and 3rd party apps like Office 365 and Salesforce.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • Market Guide for Data-Centric Audit and Protection

    Sponsored by: Imperva

    New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.

  • Putting Managed File Transfer in Perspective

    Sponsored by: IBM

    This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.

  • Cyber Liability: Risks, Ramifications, and Mitigation

    Sponsored by: eSentire

    Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

  • Replacing Antivirus, and Doing it Right: A CISO Response

    Sponsored by: Sentinel Labs, Inc.

    This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.

  • IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise

    Sponsored by: IBM

    This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Transcript: Protecting Your Crown Jewels from Devastating Data Breaches

    Sponsored by: Lancope

    Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

  • Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.

  • Understanding Cloud Security: The AWS Shared Responsibility Model

    Sponsored by: Alert Logic

    This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.