ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Making the Case for Cloud-to-Cloud Backup

    Sponsored by: Datto, Inc.

    Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • A Secure Alternative to Personal File Sharing Services in the Enterprise

    Sponsored by: Citrix

    Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.

  • The Demand for Hybrid Online File Sharing

    Sponsored by: Citrix

    In this report, learn how the OFS market is changing and uncover critical insight into the adaptions that must be made to keep clients happy. Read on to uncover why so many businesses want their OFS vendor offerings to include greater choice with how data is stored and where.

  • Top 5 requirements for secure enterprise file sync and sharing

    Sponsored by: Citrix

    The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.

  • Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add

    Sponsored by: VMware

    Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • ShareFile Enterprise: Provide Industry-leading Security

    Sponsored by: Citrix

    Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

  • Controlling Data Center Security

    Sponsored by: Barracuda Networks

    Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.

  • Navigating Email Security

    Sponsored by: ZixCorp

    Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.

  • Customer Story: Kuwait Petroleum Corporation Needed Control of Company Data Sharing

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Email Threats: Key features of an email gateway security solution

    Sponsored by: LogicNow

    What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Best Practices for Protecting Patient Data in the Cloud

    Sponsored by: Digital Guardian

    Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.

  • Stop Thinking About Your Backups: It's Time to Focus On Recovery

    Sponsored by: Dell Software

    This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.

  • Streamline Data Security Management

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    What steps should you take to best protect your virtualized cloud data? Find out inside.

  • How to Evaluate Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Stop the Bad Guys Cold: Securing Your Mobile Data

    Sponsored by: Commvault

    This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.

  • Enable Mobile Users and Stay Compliant: How Healthcare Organizations Manage Both

    Sponsored by: BlackBerry

    Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.

  • The Power of Collaboration with an Expiration Date

    Sponsored by: BlackBerry

    As more and more enterprises move toward collaboration methods that incorporate revocation or expiration, the enterprise file synchronization and sharing (EFSS) space is moving in that direction as well.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Deploying an EFSS Solution: Six Steps for Success

    Sponsored by: BlackBerry

    This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.

  • Putting Managed File Transfer in Perspective

    Sponsored by: IBM

    This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.