BeyeNETWORK business intelligence and data warehousing resources

Research Library

IT Management  >  Systems Operations  >  Security  >  
Data Loss Prevention (DLP)

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:

1 - 15 of 696 Matches
sponsored by IBM

WHITE PAPER - Read on to learn about the tools, strategies and resources that can help you implement "information economics" approach within your organization.
Posted: July 31, 2014 | Published: July 31, 2014

Get This Now
Topics:  Data Governance | Data Integration | Data Loss Prevention (DLP) | Data Management | Database Management

IBM


sponsored by N-able Technologies

WHITE PAPER - This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: July 31, 2014 | Published: July 31, 2014

Get This Now
Topics:  Backup for Virtualized Servers | Backup Software | Backups | Data Loss Prevention (DLP) | Data Management Software | Data Recovery | Data Replication | Data Security | Data Storage | Disaster Planning | Disaster Recovery | Storage Infrastructure

N-able Technologies


sponsored by N-able Technologies

WHITE PAPER - This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: July 29, 2014 | Published: July 29, 2014

Get This Now
Topics:  Backups | Data Loss Prevention (DLP) | Data Management | Data Recovery | Data Storage | Disaster Planning | Disaster Recovery | Security Threats | Small Businesses | SMBs | Storage Best Practices | Storage Management | Storage Management Services | Storage Service Providers

N-able Technologies


sponsored by HID

WHITE PAPER - This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Posted: July 29, 2014 | Published: June 26, 2014

Get This Now
Topics:  Authentication | Authorization | Data Loss Prevention (DLP) | Data Security | Password Authentication Protocol | Payment Processing | Risk Assessment | Risk Management | Security Threats

HID


sponsored by BlackBerry

WHITE PAPER - This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: July 25, 2014 | Published: July 25, 2014

Get This Now
Topics:  Application Deployment | Data Loss Prevention (DLP) | Data Security | Enterprise | Mobile Device Management | Risk Management | Security | Security Management | TCO | Virtualization Security | Vulnerability Management

BlackBerry


sponsored by BlackBerry

WHITE PAPER - This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Posted: July 25, 2014 | Published: July 25, 2014

Get This Now
Topics:  Application Monitoring | Application Security | Data Loss Prevention (DLP) | Enterprise | Mobile Device Management | Security | Security Management | Security Threats

BlackBerry


sponsored by BlackBerry

WHITE PAPER - Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to learn about the government's relationship with healthcare providers, and uncover insight for securing devices to protect sensitive data.
Posted: July 24, 2014 | Published: July 24, 2014

Get This Now
Topics:  Compliance (Systems Operations) | Data Loss Prevention (DLP) | Data Security | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA

BlackBerry


sponsored by AlienVault

WHITE PAPER - This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: July 23, 2014 | Published: June 30, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | Education Industry | IT Best Practices | IT Departments | IT Industry | IT Management | IT Managers | IT Spending | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Spending | Security Threats | Vulnerability Management

AlienVault


sponsored by IBM

WHITE PAPER - This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.
Posted: July 22, 2014 | Published: July 29, 2011

Get This Now
Topics:  Data Loss Prevention (DLP) | Laptop Computers | Mobile Device Management | Mobile Device Management Software | Mobile Workers | SharePoint | Smart Phones | Tablet PC | VPN

IBM


sponsored by CDW Corporation

VIDEO - This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: July 22, 2014 | Premiered: May 21, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | IT Best Practices | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Policies | Security Threats | Vulnerability Management

CDW Corporation


sponsored by CDW Corporation

WHITE PAPER - This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: July 22, 2014 | Published: March 5, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | IT Best Practices | IT Departments | IT Management | IT Managers | Malware | Phishing | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Policies | Security Spending | Security Threats | Spam | Spyware | Vulnerability Assessments | Vulnerability Management

CDW Corporation


sponsored by ComputerWeekly.com

ESSENTIAL GUIDE - This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: July 22, 2014 | Published: July 22, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Employment Law | Fraud Protection | Hackers | Intellectual Property | Privacy Rights | Risk Assessment | Risk Management | Security | Security Best Practices | Security Management | Security Policies | Security Systems | Security Threats | Training

ComputerWeekly.com


sponsored by CDW Corporation

WHITE PAPER - This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Posted: July 22, 2014 | Published: July 22, 2014

Get This Now
Topics:  Data Centers | Data Loss Prevention (DLP) | Endpoint Security | Security | Security Best Practices | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Systems | Security Threats

CDW Corporation


sponsored by Acronis

WHITE PAPER - This exclusive whitepaper details the features of a best in class suite of data protection products.
Posted: July 18, 2014 | Published: July 18, 2014

Get This Now
Topics:  Data Center Design | Data Center Management | Data Centers | Data Governance | Data Loss Prevention (DLP) | Data Management | Data Management Software | Disaster Planning | Disaster Recovery

Acronis


sponsored by CDW Corporation

CDW Corporation


1 - 15 of 696 Matches


Partner with Us
Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics |
Business Intelligence Network Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com