ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Loss Prevention (DLP) Research

  • ExaGrid: Cost-Effective Disk-Based Backup

    Sponsored by: ExaGrid Systems, Inc.

    The ExaGrid system is a plug-and-play disk backup appliance that works with existing backup applications. ExaGrid’s patented zone-level deduplication technology minimizes the amount of data to be stored by storing only the unique bytes across backups instead of storing the redundant data. Read on to learn more today!

  • International SOS Rescues Backups with ExaGrid

    Sponsored by: ExaGrid Systems, Inc.

    This case study from ExaGrid takes a look at how International SOS, a worldwide health services company, has implemented an Exagrid backup solutions with great success. Read on to learn more about the ways in which a comprehensive backup strategy can positively affect your business today.

  • Eliminate Tape Everywhere with and Offsite ExaGrid System

    Sponsored by: ExaGrid Systems, Inc.

    As more and more organizations turn away from tape to disk as their primary backup media, however, a significant portion of them will not only seek to eliminate tape for on-site retention, but for their off-site retention as well. Read on to learn more.

  • International Commercial Law Firm Bird & Bird Chooses ExaGrid to Deliver Its Backup Systems

    Sponsored by: ExaGrid Systems, Inc.

    This case study from ExaGrid Systems, Inc., takes a look at how international commercial law firm Bird & Bird chose to implement a backup solution from ExaGrid. Read on to learn more about the advantages inherent in a backup solution from ExaGrid.

  • Protect sensitive data with multiple layers of loss protection

    Sponsored by: CDW Healthcare

    This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

  • Top 5 Threat Protection Best Practices

    Sponsored by: Sophos

    The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.

  • Business Continuity and Disaster Recovery Strategies

    Sponsored by: TechTarget CIO

    CIOs are finding that effective BC and DR plans hinge on an understanding of emerging technologies and confidence in their supply chains. This white paper will look at the ways in which companies can implement some of these new technologies to help improve everyday business.

  • Help Alleviate Batch Windows with Reliable, Timely Data Delivery

    Sponsored by: IBM

    This paper examines the business issues that drive organizations to consider a real-time change data capture solution to optimize ETL processes. This helps alleviate batch windows to enable the delivery of timely, trusted information to the business.

  • IBM Information Archive: The Next Generation Information Retention Solutions

    Sponsored by: IBM

    Read this paper to learn how IBM Information Archive helps you store, retrieve, manage, share and protect regulated and non-regulated data with a design that is both highly secure and extremely cost efficient.

  • Application Intelligence and Control

    Sponsored by: SonicWALL

    This video explains the many malicious programs and applications that can have an impact on your networks security.

  • E-Book: Strategic guide to insider threat detection and breach response

    Sponsored by: TechTarget Security

    Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

  • Data Breaches: A Growing Problem for the Healthcare Community

    Sponsored by: Wave Systems Corp.

    While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss.

  • Data Deduplication

    Sponsored by: CDW Corporation

    This videocast from CDW Corporation will take a brief, yet comprehensive look at Data Deduplication and the distinct, operational advantages this type of storage system can have on your every day business activity when compared with traditional backup methods. View now to learn more.

  • Presentation Transcript: Centralized backup for remote offices

    Sponsored by: Iron Mountain

    This presentation transcript from Iron Mountain looks at the ways in which remote offices can implement a centralized backup system and the advantages this type of storage architecture can provide over more traditional backup methods. Read on to learn more today.

  • Presentation Transcript: 5 Ways Cloud Storage Can Work in in the Enterprise

    Sponsored by: Iron Mountain

    This presentation transcript from Iron Moutain looks at the ways in which enterprises are implementing cloud storage solutions into their everyday operations and the distinct advantages associated with a cloud infrastructure. Read on to learn more.

  • Presentation Transcript: How to Choose the Best Remote Online Backup Service Provider

    Sponsored by: Iron Mountain

    This presentation transcript from Iron Mountain takes an in-depth look at the process involved with selecting and implementing a remote online backup service. It follows a presentation given by Curtis Preston, Executive Editor, Tech Target and Independent Backup Expert. Read on to learn more today.

  • Protect sensitive data with multiple layers of loss protection

    Sponsored by: CDW Healthcare

    This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

  • Enterprise PC Backup: The New Fundamentals

    Sponsored by: Copiun

    This presentation transcript from Copiun, focuses on a conversation between Rachel Dines, Analyst at Forrester Research and Puneesh Chaudhry, CEO of Copiun. The main topic discussed is Enterprise PC backup solutions and how these types of solutions can positively affect your everyday business operations. Read on to learn more.

  • E-Guide: Is Cloud Data Backup Service Right for your Organization?

    Sponsored by: Dell, Inc. and Intel®

    This e-guide discusses different flavors of cloud backup in the market today and details what you should consider before adopting a cloud backup offering. Download this e-guide to learn more about cloud storage and how it fits into your IT plans.

  • Granular application control, intelligence and real-time visualization

    Sponsored by: SonicWALL

    It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.

  • When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption

    Sponsored by: WatchGuard Technologies, Inc.

    WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data.

  • Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

    Sponsored by: WatchGuard Technologies, Inc.

    In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.

  • Data Protection 2.0: It’s Not Just Names and Numbers Anymore

    Sponsored by: Tripwire, Inc.

    The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.

  • Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    Sponsored by: Tripwire, Inc.

    Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.