ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) White Papers

  • 6 Key Security Considerations for Responsible Cloud Migration

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.

  • A Robust Zero Data Loss Recovery Appliance

    Sponsored by: Oracle Corporation

    Database downtime can lead to data loss, which impacts not only your profits but brand reputation as well. Read this infographic to learn about a program uniquely designed to protect your Oracle databases.

  • Building Trust in a Cloudy Sky Executive Summary

    Sponsored by: McAfee, Inc.

    Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.

  • Fourth Generation Data Leak Prevention

    Sponsored by: Ghangor Cloud

    In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.

  • The Future of DLP is Automation

    Sponsored by: Ghangor Cloud

    Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.

  • Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup

    Sponsored by: Unitrends

    Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.

  • Disaster Recovery Guide: DR in Virtualized Environments

    Sponsored by: Macquarie Cloud Services

    Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.

  • When Cyberthieves Attack, Technologies Have Your Back

    Sponsored by: SearchHealthIT.com

    Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

  • Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery

    Sponsored by: QuorumLabs Inc.

    Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Data Breaches: Is Prevention Practical?

    Sponsored by: Palo Alto Networks

    Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Shadow IT Guide: Protect Data and Avoid Compliance Violations

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • Plan for Disaster Recovery Based on Specific Threat Considerations

    Sponsored by: Solarwinds MSP

    Benjamin Franklin's adage 'an ounce of prevention is worth a pound of cure' holds true for disaster recovery scenarios. Being proactive is better than being reactive. Download this e-book to access 5 key questions to ask yourself when planning and future-proofing your disaster recovery strategies.

  • How to Choose the Right Disaster Recovery Solution

    Sponsored by: Solarwinds MSP

    In this e-book, you will learn how to formulate tactical backup and recovery by considering the possible disasters, matching them with the data sets to be protected, and identifying key recovery objectives. Read on to build a DR solution requirements list that specifically matches your organization's needs.

  • Building a Data Lifecycle Management Strategy in the Era of Digital Transformation

    Sponsored by: Iron Mountain

    Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • Hitachi Data Systems and Veritas: Joint Brochure

    Sponsored by: HDS and Veritas

    Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.