ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • Solving the Challenges of BYOD

    Sponsored by: TechTarget Security

    This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.

  • Mobile Device Management Technical Guide

    Sponsored by: TechTarget Security

    In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Sponsored by: TechTarget Security

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: TechTarget Security

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • Solitarie Interglobal: Tracked, Hacked and Attacked

    Sponsored by: IBM.

    Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.

  • Data protection strategies for rapid, effective data center recovery

    Sponsored by: Dell and VMware

    This white paper explores a storage platform that includes a comprehensive set of data protection capabilities that help you meet operational and DR requirements at both local and remote sites.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: OpenText Security Solutions

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Agent based vs host based virtualization backups: has the market shifted?

    Sponsored by: Symantec Corporation

    This E-Guide provides insight into the evolution of data protection for virtual environments and reveals how host-based virtualization backups used to be king, but agent-based approaches are now catching on.

  • Gartner Magic Quadrant for Unified Threat Management

    Sponsored by: Sophos

    Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: TechTarget Security

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Threat Prevention Techniques: Best Practices for Threat Management

    Sponsored by: GeoTrust, Inc.

    SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: TechTarget Security

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • Secure, Reliable, Any-Size File Transfer with FileXpress

    Sponsored by: Attachmate Corporation

    This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.

  • Backup Basics: Disk, CDP and Cloud

    Sponsored by: Barracuda Networks

    Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.

  • What to look for in next-gen data snapshot techs

    Sponsored by: DellEMC and Intel®

    This presentation transcript, featuring backup expert Brien Posey, takes a look at the defining characteristics of a next-generation data snapshot and how this technology fits into traditional data protection programs.

  • Business Continuity Strategy Development

    Sponsored by: DellEMC and Intel®

    In this video transcript, industry expert Jon Toigo extols the essential elements of a business continuity strategy and offers advice to help you build a plan that embodies each of them.

  • Email file recovery opportunities

    Sponsored by: Kroll Ontrack, Inc.

    Access this expert E-Guide from SearchStorageChannel.com to explore email recovery from a reseller perspective and learn topics to cover with clients regarding what they'll pay for recovery testing - and how to relevantly bring it up to them.

  • Expert Video Tip Transcript: Today's Cloud Backup

    Sponsored by: Symantec Corporation

    Access this exclusive Expert Video Tip transcript about current cloud backup options to explore a 10-question Chicago Storage Decisions 2012 Q&A with independent analyst Brien Posey. Read on to learn how cloud backup is being utilized across enterprises and get the scoop on various backup devices.

  • 8 Questions to Ask Before Moving to the Cloud

    Sponsored by: Symantec Corporation

    Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • Storage Magazine: February

    Sponsored by: TechTarget Storage

    Each year, new storage challenges come to the surface, and vendors set out on creating solutions to overcome them. In this issue of Storage Magazine, our editors examine the current storage lineup and reveal the offerings that stand out across six critical categories.

  • TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today

    Sponsored by: Iron Mountain

    In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.