ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Multimedia

  • Forrester: Tips to Build Your Data Protection Business Case

    Sponsored by: Digital Guardian

    This video will teach you how to establish success factors for data protection programs.

  • How to Improve on Your Current Email Security

    Sponsored by: Proofpoint, Inc.

    This webcast explores some of the options available to you for improving and strengthen your email security. Access it and learn how you can build on current email security measures by adding advanced encryption, threat intelligence, and more.

  • Cloud Data Encryption Made Easy

    Sponsored by: Oracle Corporation

    This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.

  • Standard Operating Environment (SOE): Maximizing an Open Architecture

    Sponsored by: Red Hat

    In this webcast, you will learn how to implement a standard operating environment (SOE) with a unified platform, in order to eliminate the chaos of multiple operating systems. View now to maximize the benefits of open architecture.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Search Security University: Cyber Security

    Sponsored by: SearchSecurity.com

    Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.

  • Security University: Data Loss Prevention

    Sponsored by: SearchSecurity.com

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Backup critical data with smart solutions

    Sponsored by: Hewlett Packard Enterprise

    Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • Data Loss Prevention (DLP) Solutions Spotlight

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service

    Sponsored by: Citrix Ready and Caringo

    In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)

    Sponsored by: Oracle Corporation

    In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.

  • Understanding BlackBerry Balance

    Sponsored by: BlackBerry

    This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.

  • Hitachi Content Platform Anywhere

    Sponsored by: Hitachi Data Systems

    Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.

  • Security University: Database Security Issues

    Sponsored by: SearchSecurity.com

    The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.

  • Secure, Reliable, Any-Size File Transfer with FileXpress

    Sponsored by: Attachmate Corporation

    This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • Better cloud security with certificate and key management

    Sponsored by: Venafi

    This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.

  • Symantec NetBackup 5220 Appliance

    Sponsored by: DLT Solutions

    Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box.

  • Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami

    Sponsored by: Dell Software

    In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.

  • Symantec Web Gateway 5.0 Trialware

    Sponsored by: Symantec Corporation

    In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.