You've requested...

Share this with your colleagues:

2016 Data Protection Vertical Industry Findings

If a new window did not open, click here to view this asset.

Download this next:

Data protection case study: How a large financial institution prevents data loss

When sensitive information gets into the wrong hands, the costs can be severe: fines, lawsuits, embarrassing headlines, loss of intellectual property, even risk to public safety. Using techniques such as data classification and content validation can help you mitigate data loss.

One of the largest Canadian financial institutions was looking to enhance their data security best practices.

In this case study, learn how they were able to address compliance requirements and mitigate data loss by implementing TITUS Classification.

These are also closely related to: "2016 Data Protection Vertical Industry Findings"

  • The largest areas of risk in cloud computing

    As organizations today take advantage of the cloud, there’s one thing they can’t forget— their data.

    When using software-as-a-service (SaaS), organizations are responsible for the security of their data and need to ensure it is accessed appropriately.

    In this Cloud Adoption and Risk Report, uncover

    • Types of sensitive data in the cloud and how they're shared
    • IaaS security and adoption trends
    • Common threats in the cloud
    • And more

  • Symantec vs. McAfee vs. Microsoft vs. the rest: Cloud security gateway vendors, compared

    Protecting cloud applications from data loss or theft, privacy abuses, advanced threats, and other risks is very challenging.

    In the evolving market for cloud security gateways (CSGs), enterprises increasingly want to monitor and secure all their cloud workloads using as few solutions as possible.

    CSGs detect and intercept anomalous cloud application activity using integration with next-gen firewall logs, endpoint agents, in-line proxies, and cloud platform APIs.

    In this report, learn more about the top CSG vendors and what you should look for in a provider including:

    • Offering cloud malware detection and integration with existing endpoint security tools
    • Monitoring and defending infrastructure-as-a-service (IaaS) platforms
    • Protecting and encrypting data in cloud applications

Find more content like what you just read:

  • The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.

    Download

  • The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.

    Download

  • Data Security Portfolio Vendors, Q2 2019

    This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.

    Download

  • Maturing Your DLP Strategy for Today’s Threats

    Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.

    Download

  • Forcepoint vs. McAfee vs. 10 more: DLP vendors, compared

    Tap into this analysis of the market for data loss prevention solutions that reveals top players, trail blazers, specialists and mature players.

    Download

  • Information Security Magazine - May 2012

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

    Download

  • Network security is being redefined to better block data raiders

    This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

    Download

  • Learn how to stop email threats to protect users and data

    There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.

    Download

  • 3 common insider data threats to prepare for

    Rising rates of employee turnover creates more opportunities and gaps for outgoing employees to steal, leak, or compromise company data and files. Download this insider data loss threat protection sheet to learn about the signs of each major insider data threat, and have the right plan in place to keep data secure.

    Download

  • Corporate web security: 12 vendors compared

    This Radicati Market Quadrant compares the strengths and weaknesses of 12 corporate web security vendors including Symantec, Forcepoint, McAfee, Sophos, and more.

    Download

  • The truth: 24 million quitting employees steal data

    Not all employees leaving your business steal data, but according to a recent study, of the 24 million quitters last year that took data from their employers, 90% went unnoticed. Download this data loss protection sheet which highlights a realistic quitting story with a data thief, and learn how management and monitoring can save your data.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • Challenges With Data Protection in the Cloud

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Endpoint Security IT Decision Center Handbook 2

    Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

    Download

  • Debunking APT myths: What it really means and what you can do about it

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • How TITUS Intelligence Protection can help your data security

    One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.

    Download

  • Research report: Evaluating security analytics platform providers

    In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.

    Download

  • Leading vendors in security analytics

    Explore 13 security analytics providers and how they stack up.

    Download

  • Utilizing Microsoft 365 to secure the modern workplace

    Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.

    Download

  • 3 major financial benefits of data loss protection

    How important to your bottom line is data loss protection? Download this 24-page e-book that includes the financial reports in data loss protection benefits, and includes 5 IT leader interviews on their data loss protection experiences.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • Top security threats to your SaaS applications

    In today's rapidly evolving threat landscape, businesses require cybersecurity strategies that leverage capabilities delivered by a world-class SOC. Download this white paper to learn how you can establish a comprehensive security strategy for maximum protection.

    Download

  • CW+: Quocirca report: You sent what ?

    Electronically stored information is a key asset for any organisation, but it is often insufficiently cared for—as the numerous high profile data breaches reported in recent years demonstrate.

    Download

  • ISM Essentials Guide on Cloud and Virtualization Security

    Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • A Guide to Cyber Risk

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

    Download

  • Security strategy essential to keep ahead of rapidly changing threats

    This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.

    Download

  • Weak links – Strengthening the information supply chain

    Analysts Bob Tarzey and Rob Bamforth argues the case for a systematic approach to securing the information supply chain.

    Download

  • 5 ways to rethink your endpoint protection strategy

    Device security is no longer about traditional antivirus versus next-generation endpoint protection. The truth is you need a layered and integrated defense that protects your entire digital terrain and all types of devices—traditional and nontraditional. In this white paper, discover 5 ways to rethink your endpoint protection strategy today.

    Download

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • IT in Europe: Security in the Cloud

    Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • How 2 different security professional personas view digital transformation

    A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.

    Download

  • AI/ML: Humans will not be eclipsed by machines

    The capabilities of AI/ML are vast - but without practical use cases there will be no tangible benefits for a business. For a wide look at AI/ML capabilities and what challenges you will face in implementation, read this white paper.

    Download

  • 21 endpoint protection platform vendors & their core capabilities

    Endpoint protection is evolving to address security architecture tasks such as hardening, investigation, incident detection and incident response. In this Gartner analysis report, discover critical capabilities of Endpoint Protection Platform vendors and how their products stack up.

    Download

  • Balancing security and digital transformation

    This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.

    Download

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

    Download