Research Library

Powered by

Data Loss Prevention (DLP) Research

  • Stop Thinking About Your Backups: It's Time to Focus On Recovery

    Sponsored by: Dell Software

    This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.

  • Streamline Data Security Management

    Sponsored by: IBM

    Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Comprehensive data protection for physical, virtual and cloud infrastructures

    Sponsored by: IBM

    What steps should you take to best protect your virtualized cloud data? Find out inside.

  • How to Evaluate Managed Security Services

    Sponsored by: IBM

    This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.

  • Stop the Bad Guys Cold: Securing Your Mobile Data

    Sponsored by: Commvault

    This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.

  • Next-Generation IPS in the Era of Targeted Attacks

    Sponsored by: IBM

    This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.

  • Create a Solid Incident Response Plan and Respond to Threats Efficiently

    Sponsored by: Dell SecureWorks

    In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Realize the value of data protection at scale

    Sponsored by: HGST

    In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.

  • Today's Most Valuable Commodity is Located in Cyberspace

    Sponsored by: Digital Guardian

    This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.

  • Determining the True Costs of a Data Breach

    Sponsored by: Dell SecureWorks

    This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • Vendor Comparison: Intrusion Prevention Systems (IPS )

    Sponsored by: IBM

    This report by Gartner compares intrusion prevention systems (IPSs) in the market today. Uncover the strengths and cautions of the leaders, challengers, niche players, and visionaries.

  • Future-Proof Your Identity Management in the Cloud

    Sponsored by: Rackspace

    This article explores how a solid IAM strategy, coupled with a fully managed service, allows customers to provide their end users with a simple, powerful solution.

  • Next-Generation Endpoint Security for Dummies

    Sponsored by: Carbon Black

    This e-book explains how all organizations are targeted in today's advanced threat environment. Discover how endpoints can serve as vulnerabilities to adversaries seeking to exploit your enterprise.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • Putting Managed File Transfer in Perspective

    Sponsored by: IBM

    This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.

  • Cyber Liability: Risks, Ramifications, and Mitigation

    Sponsored by: eSentire

    Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by:

    In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

  • Replacing Antivirus, and Doing it Right: A CISO Response

    Sponsored by: Sentinel Labs, Inc.

    This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.

  • IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise

    Sponsored by: IBM

    This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Transcript: Protecting Your Crown Jewels from Devastating Data Breaches

    Sponsored by: Lancope

    Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.