ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP)Research

  • Endpoint Security IT Decision Center Handbook 2

    Sponsored by: SearchSecurity.com

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

  • Top 10 Backup Challenges and Expert Recommendations to Address Them

    Sponsored by: SearchStorage.com

    This e-guide reports today's top backup challenges companies are struggling to address and explains how erasure coding, object storage, and other innovative approaches can eliminate the need to restore, enabling instant recovery instead. Read on now to learn more.

  • Paying a Fair Price for Data Backup

    Sponsored by: Asigra

    This informative paper explores a new enterprise backup licensing model based on recovery. Discover how this approach ensures you're paying a fair price for your data backup and recovery and protects your information, no matter what. Read on now to learn more.

  • CIO Decisions E-Zine: The New BPM

    Sponsored by: SearchCIO.com

    Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge.

  • Dealing with Data Growth: Storage and Backup Strategies

    Sponsored by: Simplify IT

    This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.

  • Enterprise Resiliency & Application Recovery

    Sponsored by: SunGard Availability Services

    When disaster strikes, your IT information and data is compromised. This side-by-side case study outlines how East Coast University and a medical center in NYC helped weather hurricane sandy and maintain IT availability.

  • The Past, Present, and Future of RAID Data Protection

    Sponsored by: SearchCloudStorage.com

    In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.

  • For Secure Access, Passwords Alone Do Not Work

    Sponsored by: Verizon

    This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.

  • Safeguarding Business in a Time of Expanding and Evolving Cyber Threats

    Sponsored by: Verizon

    This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.

  • Mobility is here to stay – Is your data is backed up?

    Sponsored by: SearchDataBackup.com

    Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.

  • Optimize Your Network with Dell and Silver Peak and Reap the Benefits

    Sponsored by: Dell and Microsoft

    This informative paper explores a partnership that addresses today's consolidation, backup, replication and unified communications. Discover how this cost effectively increase network capacity, optimize network quality, and help ensure maximum performance over distance—all while helping to reduce ongoing IT operating costs. Read on to learn more.

  • Retailer stays number one with enhanced IT support

    Sponsored by: Dell, Inc.

    This informative paper explores how one organization easily and affordably implemented these modern technologies to keep up in today's fast-paced and virtualized landscape. Read on to learn about the benefits they now enjoy.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • Why Upgrade to NetBackup 5230 and 5030 Appliances?

    Sponsored by: DLT Solutions

    This informative resource examines a modernized backup approach with expandable storage and end-to-end data protection for physical and virtual environments. Read on to discover more.

  • Symantec NetBackup Appliances: Key Factors in Modernizing Backup and Recovery

    Sponsored by: DLT Solutions

    This informative paper explores considerations to take into account when looking to modernize your backup and recovery initiatives. Read on to learn more.

  • What's New with Symantec NetBackup Appliances

    Sponsored by: DLT Solutions

    This informative paper examines what's new in the realm of backup appliances and explores how today's IT pros are changing the way they backup and recover virtual and physical environments. Read on now to learn more.

  • Tech Brief (FAQ): Windows Server 2012 Recycle Bin

    Sponsored by: Dell Software

    Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper

  • Endpoint Security Technology

    Sponsored by: Symantec Corporation

    Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.

  • Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ

    Sponsored by: Symantec Corporation

    This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.

  • WatchGuard- Data Loss Prevention

    Sponsored by: WatchGuard Technologies, Inc.

    This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe.

  • Todd Street Productions Uses InMage to Protect Mission Critical Data During Superstorm Sandy

    Sponsored by: InMage Systems

    This informative resource explores how one company easily and affordably implemented a disk-based backup and recovery software that saved their data during disastrous Hurricane Sandy. Read on now to discover the other benefits this solution provides.

  • Symantec Backup Exec 2012 V-Ray Edition

    Sponsored by: Symantec Corporation

    This informative paper examines a backup and recovery software solution built for companies that have virtualized their environments. Discover how this technology can help you achieve unmatched backup and recovery, deduplication everywhere, victory over complexity and much more. Read on now to learn more.

  • The Newark Group Uses InMage to Increase Backup Reliability, Reduce Down Time, and Drive Down Costs

    Sponsored by: InMage Systems

    This informative paper explores how one organization easily and affordably implemented a disk-based backup and recovery software solution to increase backup reliability, reduce downtime, drive down costs and more. Read on to learn more.

  • File Sync and Share: Risks, Rewards, Considerations, and Deployment Options

    Sponsored by: Dropbox for Business

    This e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.

  • Expert Overview: Replication Use Cases and Implementation Techniques

    Sponsored by: EMC Corporation

    This e-guide discusses how replication fits into remote site data protection and reveals the pros and cons of host and array-based techniques. Find out whether replication can be used as a backup replacement and why real-time requirements should be factored into your selection of a synchronous or asynchronous method. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.