ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Multimedia

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Gartner Research Director Perry Carpenter shows you how to prevent future spear phishing attacks and what capabilities your spear phishing solution needs in order to be effective.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • Forrester: Tips to Build Your Data Protection Business Case

    Sponsored by: Digital Guardian

    This video will teach you how to establish success factors for data protection programs.

  • Search Security University: Cyber Security

    Sponsored by: SearchSecurity.com

    Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Backup critical data with smart solutions

    Sponsored by: Hewlett Packard Enterprise

    Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • Data Loss Prevention (DLP) Solutions Spotlight

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service

    Sponsored by: Citrix Ready and Caringo

    In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)

    Sponsored by: Oracle Corporation

    In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.

  • Understanding BlackBerry Balance

    Sponsored by: BlackBerry

    This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.

  • Hitachi Content Platform Anywhere

    Sponsored by: Hitachi Data Systems

    Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.