ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Multimedia

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Backup critical data with smart solutions

    Sponsored by: Hewlett Packard Enterprise

    Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service

    Sponsored by: Citrix Ready and Caringo

    In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)

    Sponsored by: Oracle Corporation

    In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.

  • Hitachi Content Platform Anywhere

    Sponsored by: Hitachi Vantara

    Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.

  • Security University: Data Loss Prevention

    Sponsored by: TechTarget Security

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Secure, Reliable, Any-Size File Transfer with FileXpress

    Sponsored by: Attachmate Corporation

    This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • Symantec NetBackup 5220 Appliance

    Sponsored by: DLT Solutions

    Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box.

  • Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami

    Sponsored by: Dell Software

    In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.

  • Symantec Web Gateway 5.0 Trialware

    Sponsored by: Symantec Corporation

    In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.

  • Why ExaGrid? Overview Video

    Sponsored by: ExaGrid Systems, Inc.

    Are you facing challenges like data growth, increased storage costs, slow backups or failed restores? Check out this short video to discover how ExaGrid is making backup better with the only system purpose-built for backup that protects your data, your time, and your budget.

  • NetApp News

    Sponsored by: NetApp

    Watch this edition of "NetApp News" to keep up with the latest products and developments that NetApp has to offer. In this video, you'll receive a hands-on introduction to some of NetApp's newest storage technologies, and explore a step-by-step walk through of one of the company's system manager software platforms.

  • Acronis vmProtect 6

    Sponsored by: Acronis

    Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.

  • High Performance Storage with Dell and Terascala

    Sponsored by: Terascala

    In this video, Dell and Terascala introduce and install high-perfomance storage in Dell's Public Solutions Center.

  • Quest Software - Data Protection Simplified

    Sponsored by: Dell Software

    In this videocast you'll learn about solutions for physical, virtual, cloud and application data protection and what you need to do to ensure your data is both protected and accessible.

  • Application Intelligence and Control

    Sponsored by: SonicWALL

    This video explains the many malicious programs and applications that can have an impact on your networks security.

  • Data Deduplication

    Sponsored by: CDW Corporation

    This videocast from CDW Corporation will take a brief, yet comprehensive look at Data Deduplication and the distinct, operational advantages this type of storage system can have on your every day business activity when compared with traditional backup methods. View now to learn more.

  • Cost Effective Techniques for Designing the Data Warehouse

    Sponsored by: Embarcadero Technologies, Inc.

    A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.