ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) White Papers

  • Infographic: 10-step guide for testing backups

    Sponsored by: TechTarget ComputerWeekly.com

    Creating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • CW Nordics August 2016

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • Breaking Down Industry Leading Data Protection Vendors & Options

    Sponsored by: TechTarget Data Backup

    Read this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.

  • Navigating Ransomware Recovery

    Sponsored by: Cisco Umbrella

    The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.

  • Navigating VMware and Cloud Backups

    Sponsored by: Clumio

    VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.

  • Best Practices for Data Backup and DR Planning in 2019

    Sponsored by: New Cloud Networks

    In this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.

  • The Security Benefits of DLP

    Sponsored by: InteliSecure

    Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.

  • Six Criteria for Buying Data Loss Prevention Products

    Sponsored by: InteliSecure

    Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.

  • Introduction to Data Loss Prevention Tools

    Sponsored by: InteliSecure

    In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.

  • When Cyberthieves Attack, Technologies Have Your Back

    Sponsored by: TechTarget Health IT

    Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

  • Resource Center: How to Safeguard Data

    Sponsored by: McAfee, Inc.

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Enhance Your Endpoint Security Protection

    Sponsored by: Trend Micro, Inc.

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • Protect Yourself From Antivirus

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: TechTarget Security

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Cloud Security Gateways Rise to the Data Loss Challenge

    Sponsored by: TechTarget Security

    This issue of Information Security magazine uncovers cloud data loss prevention (DLP) strategies and whether CASBs can offer another layer of protection. Additionally, learn about the Cybersecurity National Action Plan and the readers' top picks for endpoint protection software.

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.