ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • 8 Storage Tips and Tricks from Pure Storage

    Sponsored by: Pure Storage

    This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.

  • Case Study: Blast Performance with Flash

    Sponsored by: Pure Storage

    This case study showcases a company's adoption of flash storage to free up data center space previously occupied by several legacy disk arrays. Read on to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.

  • Cloud-to-Cloud Backup: Protecting Data from Malicious Intent

    Sponsored by: Barracuda Networks

    This white paper explores the data backup and recovery shortcomings of Office 365 and the steps to take to protect data against accidental or malicious loss.

  • Data Breach Readiness 2.0

    Sponsored by: ComputerWeekly.com

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

  • Tactics to combat insider threat

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • State of File Collaboration Security

    Sponsored by: FinalCode

    Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.

  • How to Virtualize Disaster Recovery with Cloud Computing

    Sponsored by: IBM

    This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.

  • Linking Resiliency to Business Objectives: How To Make a Case For Corporate Investment

    Sponsored by: IBM

    This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.

  • Security Report Card: Do You Meet NIST Standards?

    Sponsored by: LogRhythm, Inc.

    The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.

  • Is it time for a DLP system in your enterprise?

    Sponsored by: SearchSecurity.com

    Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.

  • Case Study: Catching Virtual Thieves

    Sponsored by: Prelert

    In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.

  • Protecting Against Web Application Threats Using SSL

    Sponsored by: Symantec Website Security Solutions

    In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.

  • Get the Upper Hand on Virtual Machine Sprawl

    Sponsored by: SearchServerVirtualization

    As hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.

  • Data Loss Prevention: Decision Time

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: RFP Technology Decisions

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: From Business Problem to Technical Solution

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Seven Keys to Securing Your Growing Business

    Sponsored by: Sophos, Inc.

    This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.

  • Best Practices for a Secure Mobile Workforce

    Sponsored by: Accellion, Inc.

    Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • What's New in Symantec Data Loss Prevention

    Sponsored by: Symantec Corporation

    This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

  • 6 Ways You can Improve Backup and Recovery

    Sponsored by: VMware, Inc.

    Check out this resource to discover the huge number of benefits that can be gained from leveraging server virtualization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.