ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Multimedia

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • SLA-Driven Data Protection Modernization: An ESG Video Interview

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • Achieving Maximum Backup Granularity

    Sponsored by: Veeam Software

    Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.

  • IBM Data Protection Modernization and Strategy: An ESG Webinar

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • ESG Video Interview: Virtualization-Driven Data Protection Modernization

    Sponsored by: IBM

    ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.

  • Simplified Data Protection for the Modern Enterprise: An Expert Evaluation

    Sponsored by: IBM

    Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.

  • Streamlining Data Backup: Recovery Manager Central ChalkTalk

    Sponsored by: NTT ICT

    How can you streamline backup and recovery for an efficient use of resources? Tune into this video to leverage centralized recovery with a converged data protection solution—combining the accelerated performance of snapshots with the dedicated protection of backup.

  • Data Protection. No Limits.

    Sponsored by: NTT ICT

    This video highlights how Marriott Resorts, Mansfield Oil, and Shields Healthcare boosted the speed at which they backup and recover sensitive data with "no limits" data protection. Tune in to discover a data backup platform that performs seamlessly across all industries.

  • "Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs

    Sponsored by: NTT ICT

    If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.

  • Secure Your Growing Data with Disk-Based Backup and Recovery

    Sponsored by: NTT ICT

    Discover how to keep pace with rapid data growth while reducing cost and capacity requirements by leveraging disk-based backup architecture. Tune into this video to take advantage of rapid recovery and app integration, as well as software-defined data protection that removes the need for in-store dedicated backup at ROBOs.

  • 9 Steps to Build a Better Insider Threat Program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Learn 9 ways to manage and mitigate insider threats within your organization.

  • Global Data Protection Index Highlights

    Sponsored by: Dell EMC

    EMC's Global Data Protection Index of 2016 revealed that most businesses are still unprepared for new, emerging threats. Discover the outlook of data protection strategies around the world, and learn how to prepare for the rapidly changing landscape of threats to enterprise data.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • An IT Pro’s Guide to Protecting Virtualized Data

    Sponsored by: arcserve

    Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

  • Forrester: Tips to Build Your Data Protection Business Case

    Sponsored by: Digital Guardian

    This video will teach you how to establish success factors for data protection programs.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.