ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • IBM 2015 Cyber Security Intelligence Index for Information and Communication

    Sponsored by: IBM

    This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.

  • Overview of the Asia-Pacic Intrusion Detection & Prevention Systems Market

    Sponsored by: IBM

    This white paper shows you how greatly IDS/IPS is growing in Asia Pacific and methods they are using to stay ahead of advanced threats. Access now and learn how to improve your organization's awareness of these threats and prepare yourself against sophisticated attacks in the future.

  • How to Evaluate Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Stop the Bad Guys Cold: Securing Your Mobile Data

    Sponsored by: Commvault

    This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM

    This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.

  • How Healthcare Organizations Both Enable Mobile Users and Stay Compliant

    Sponsored by: BlackBerry

    Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.

  • Next-Generation IPS in the Era of Targeted Attacks

    Sponsored by: IBM

    This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.

  • The Power of Collaboration with an Expiration Date

    Sponsored by: BlackBerry

    As more and more enterprises move toward collaboration methods that incorporate revocation or expiration, the enterprise file synchronization and sharing (EFSS) space is moving in that direction as well.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Deploying an EFSS Solution: Six Steps for Success

    Sponsored by: BlackBerry

    This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Develop a strong IAM strategy for third-party vendors

    Sponsored by: Radiant Logic, Inc.

    This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.

  • Realize the value of data protection at scale

    Sponsored by: HGST

    In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.

  • The Human Factor Report

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

  • Today's Most Valuable Commodity is Located in Cyberspace

    Sponsored by: Digital Guardian

    This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.

  • Webinar - Network security without compromise

    Sponsored by: Aruba Networks

    In this webcast, you will learn how to enhance network security, enforcement and a better user experience.

  • Determining the True Costs of a Data Breach

    Sponsored by: Dell SecureWorks

    This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise

    Sponsored by: IBM

    This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.

  • Putting Managed File Transfer in Perspective

    Sponsored by: IBM

    This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.

  • Cyber Liability: Risks, Ramifications, and Mitigation

    Sponsored by: eSentire

    Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.

  • Replacing Antivirus, and Doing it Right: A CISO Response

    Sponsored by: Sentinel Labs, Inc.

    This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.