Data Loss Prevention (DLP) Research
-
Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
Sponsored by: TechTarget SecurityThis E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
-
Top 10 BYOD Pitfalls to Avoid
Sponsored by: TechTarget SecurityThis expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
-
Rethink Defense-In-Depth Security Model For BYOD
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
-
Mobile Device Data Protection: Key Findings and Players in the Market
Sponsored by: TechTarget SecurityThis E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
-
Challenges With Data Protection in the Cloud
Sponsored by: TechTarget SecurityThis expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
-
Demonstrating Proven Business Value Through Backup Redesign with EMC: Not Enough Hours in the Day for Backup
Sponsored by: EMCThis informative resource discusses how one organization easily and affordably implemented a backup solution that provides efficiency and resilience to conquer the challenges of today's IT landscape.
-
Secure Your Backup Tapes Every Step of the Way
Sponsored by: Iron MountainThis short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.
-
IT Reputational Risk Study Overview
Sponsored by: IBMThis short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
-
Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
Sponsored by: Oracle CorporationIn this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
-
Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
Sponsored by: EMC & ArrowThis E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
-
File Sync and Share vs. Endpoint Backup
Sponsored by: Code42This short white paper provides insight into clearing up the confusion between backup and sync/share.
-
IBM Power Systems Keep Your Applications Ready for Anything
Sponsored by: IBMThis short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
-
Object Storage: Imagine the possibilities… More data, less headaches
Sponsored by: Hitachi VantaraThis eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
-
Hitachi Content Platform Anywhere
Sponsored by: Hitachi VantaraWatch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
-
Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
Sponsored by: NeverfailThis case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
-
Neverfail Heartbeat Failover Engine
Sponsored by: NeverfailCheck out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
-
A CIO's Five-Point Plan for Managing Endpoint Security
Sponsored by: Dell KACEManaging endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
-
Uses and Misuses for Disk-based Backup
Sponsored by: ExaGrid Systems, Inc.In this E-Guide, expert Jon Toigo offers advice on maximizing the disk storage you have and avoiding the tendency to use this media when it isn't necessary.
-
Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions
Sponsored by: SEPATONThis E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
Security University: Data Loss Prevention
Sponsored by: TechTarget SecurityThe difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
-
Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
Sponsored by: EMC & ArrowThis white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
-
Archiving, Backup, and DR: Essential Tips and Issues to Address
Sponsored by: Rand Secure DataThis E-Guide points out four records retention issues you may inadvertently be exposing your business to and reveals the keys to integrating backup, archiving, and DR.
-
Developing Effective DR/BC Plans
Sponsored by: Iron MountainThis Essential Guide offers a primer on business continuity and risk management. Get exclusive information on tailoring a DR plan to your organization's needs and discover 10 things every IT professional should know about disaster recovery. Read on to make DR planning a priority before it's too late.
-
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Sponsored by: Dell SecureWorksUncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.