ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) White Papers

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

    Sponsored by: Ambra

    Discover why choosing the right cloud platform can make or break your PACS. Additionally, view the key benefits accrued from cloud PACS adoption, including the elimination of CDs, seamless cloud delivery and collaboration, reduced time-to-care delivery, and enhanced relationships with referring physicians.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Case Study: Disc Comfort Fuses Image Management and the Cloud

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a cloud imaging suite that will reduce time spent loading and viewing patient CDs. Additionally, discover how transitioning on premise CDs to the cloud for storage and retrieval will transform patient care.

  • CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS

    Sponsored by: Ambra

    Discover how to streamline image management, reduce risk of data exposure, and eliminate barriers to siloed information across the network by cloud-enabling PACS. Learn from Carewell's case study how to streamline every aspect of the patient journey.

  • The New World of Unified Image Management

    Sponsored by: Ambra

    In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • 4 Countermeasures to Protect Against Ransomware

    Sponsored by: TrendMicro

    Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: NTT ICT

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • Is the Hybrid Storage Array Dying?

    Sponsored by: Dell EMC

    Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.

  • Trusted Backup and Recovery Software Solutions Simplify Administration

    Sponsored by: IBM

    Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.

  • Protecting Critical Data in Virtual Environments

    Sponsored by: IBM

    VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.

  • Big Data: Securing Apache Hadoop Platform

    Sponsored by: Intel Corporation

    While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.

  • CW Nordics August 2016

    Sponsored by: ComputerWeekly.com

    The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.

  • Backupify for Office 365: Return of the Data

    Sponsored by: Datto, Inc.

    This e-book highlights a secure backup and recovery solution for Office 365. Discover how you can enable automatic backups and capacity planning with a backup solution that includes features such as built-in data encryption, export capabilities, compliance controls, and more.

  • Converged Data Protection for Continuously Available Applications

    Sponsored by: NTT ICT

    Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.

  • Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection

    Sponsored by: NTT ICT

    This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.

  • Application-managed Data Protection for HPE 3PAR StoreServ Storage

    Sponsored by: NTT ICT

    In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.

  • Infographic: EMC Global Data Protection Index

    Sponsored by: Richardson Eyres

    EMC's global data protection index highlights the maturity of data protection approaches around the world. Discover how enterprises are faring in regards to data loss prevention and disaster recovery, and see how leaders are staying ahead of the curve when it comes to their data protection approach with cloud computing.

  • Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Secure Hosting Creates Foundation for Innovative Telemedicine

    Sponsored by: BT

    In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.