ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) White Papers

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Data Breaches: Is Prevention Practical?

    Sponsored by: Palo Alto Networks

    Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Six Steps to Effective Healthcare Data Breach Response

    Sponsored by: Absolute

    Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • How to Save Storage Space with Purposeful Backups

    Sponsored by: Veeam Software

    Discover how to effectively reduce storage capacity when performing backups by combining the strategies outlined here for flexible and powerful data protection. Based on your needs, learn when you should prioritize SLA over storage (and vice versa), best practices when backing up to tape, and more.

  • IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy

    Sponsored by: SAS

    Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Shadow IT Guide: Protect Data and Avoid Compliance Violations

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security

    Sponsored by: Absolute

    Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • Security & Compliance Are No Gamble

    Sponsored by: Armor

    Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

    Sponsored by: Ambra

    Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Case Study: Disc Comfort Fuses Image Management with athenahealth

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.

  • Case Study: CareWell Streamlines Patient Journey & Reduces Risk

    Sponsored by: Ambra

    Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.