ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) White Papers

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Best Practices for Safeguarding Patient Records and Sensitive Information

    Sponsored by: Symantec Corporation

    In this exclusive white paper uncover the 101 on safeguarding patient records and sensitive information. Read on to learn about topics like, managing data on-premises and in the cloud, data loss prevention, and much more.

  • Clustering for Axway SecureTransport

    Sponsored by: Axway

    Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Leverage leading technologies to improve performance, management, scalability, and resiliency, so your MFT infrastructure is always available to support the way you, your customers, and your partners do business.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Discover how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Integrating Data Protection andActive Archiving

    Sponsored by: HGST

    Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.

  • Few Fully Prepared for Software Security Risks

    Sponsored by: Hewlett Packard Enterprise

    This white paper shows you results from a recent security survey and the value of testing your security measure regularly.

  • The Essential DBA Playbook for Optimized SQL Server Management

    Sponsored by: Dell, Inc.

    Discover the essentials of optimizing SQL Server management in your organization in this comprehensive guide. Read on to determine how successful DBAs optimize their SQL Server environment, and gain exclusive insight into how to establish highly available backup and recovery, take advantage of database automation, and more.

  • Defend Against Threats of Global Operations

    Sponsored by: Verizon

    Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.

  • Evaluating Today's Enterprise Backup Software and Integrated Appliances

    Sponsored by: Commvault

    The following report examines the top data protection vendors and includes strategic planning assumptions about data protection, and expert comparison of each vendor and offerings, and more. Access now and learn what it takes to ensure the complete safety of your data.

  • Masergy UES Offers Unique Approach to Network Defense

    Sponsored by: MASERGY

    Instead of applying a one-size-fits-all approach, machine learning detects events differently on different networks. It uses multistaged analysis to learn predictable patterns on your network and methods that work best for it. Discover how unified enterprise security can benefit your unique network architecture.

  • Find, Classify, Protect your data

    Sponsored by: Verizon

    Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.

  • The Definitive Guide to Data Loss Prevention

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts

  • Setting new standards in cardholder data protection

    Sponsored by: Verizon

    Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.

  • Recognize and Respond to Cyber Attacks

    Sponsored by: Verizon

    The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.

  • Protect Your Data: 7 Ways to Improve Your Security Posture

    Sponsored by: Microsoft

    Discover 7 ways that an enterprise can improve its fundamental security posture to combat modern threats. Read on to familiarize yourself with essentials like identity and access management, leveraging conditional access, enabling secure collaboration, and more.

  • The Right Data Loss Prevention Products, Case by Case

    Sponsored by: Intel Security

    This e-guide examines three data loss prevention (DLP) usage scenarios -- and the common issues associated with them -- to better help you make the right decision when purchasing DLP products. Explore subject matter from cybersecurity experts based on several companies' data classification policies.

  • Keep Office 365 compliance in check with these tools

    Sponsored by: Symantec Corporation

    When it comes to Microsoft Office 365, cybersecurity is a top concern. That's why it's a priority for the software giant. Learn what's available to keep corporate data safe and compliant.

  • Critical Capabilities for Enterprise Data Loss Prevention

    Sponsored by: Digital Guardian

    IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. This research evaluates DLP products for these three use cases, based on nine critical capabilities. Read on to learn more.

  • Integrating Host Systems With Modern Security Frameworks

    Sponsored by: Novell Ltd.

    This white paper reveals a practical way to bring your host systems into the modern security fold. Close the technology gap without jeopardizing business operations.

  • Total Protection for Data Loss Prevention - Solution Brief

    Sponsored by: Intel Security

    Learn about a data-centric system that delivers data security and actionable insight about data at rest, data in motion and data in use across your entire organization. Easily identify potential threats and refine policies as needed to quickly respond to the shifting threat landscape.

  • Data Loss Prevention Best Practices for Health Care

    Sponsored by: Intel Security

    Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.