Data Loss Prevention (DLP) Reports

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget Security

Implementing Replication: Balancing Cost vs. Convenience
sponsored by TechTarget Storage
EBOOK: Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

TechTarget Storage

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

TechTarget Security

VM Backup Methods for Quick VM Recovery
sponsored by TechTarget Storage
EGUIDE: Learn two essential approaches for getting a server back online in just minutes – the failover method and data prioritization and discover which strategy trades slightly more downtown for less up-front data storage waste.
Posted: 16 Jan 2013 | Published: 16 Jan 2013

TechTarget Storage

Top 5 Enterprise Mobile Security Issues
sponsored by TechTarget Security
EGUIDE: While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security

BYOPC Strategy: Policies and Problem Solving
sponsored by TechTarget Security
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget Security

Four DLP Best Practices To Enhance Security
sponsored by TechTarget Security
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

TechTarget Security

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by TechTarget Security
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Tape's New Niche: Long-Term Data Retention
sponsored by Iron Mountain
EGUIDE: This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.
Posted: 11 Feb 2013 | Published: 13 Mar 2013

Iron Mountain

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

New Stats and Tools Dispel Prevailing VM Backup Myths
sponsored by Idera
EGUIDE: In this expert, exclusive E-Guide from SearchDataBackup.com, learn about other myths surrounding VM backup and explore the results of a 2012 survey your peers took regarding data protection for VMs. Read on to catch up on the most recent developments that have simplified the virtual data protection space.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Idera

Emergency Management Plans Made Easy & Practical
sponsored by VMware, Inc.
EGUIDE: Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

VMware, Inc.

Backup Apps: State of the Art
sponsored by TechTarget Storage
EDITORIAL RESOURCE GUIDE: Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

TechTarget Storage

Expert Tips for Implementing Cloud Storage
sponsored by OnX USA LLC
EGUIDE: Access this SearchStorage.com E-Guide to find strategies to consider and leverage before implementing cloud techs in your infrastructure. Read on for industry ace Arun Taneja's insight into cautions about signing on with a cloud storage provider before you have the details on them, and explore long-term considerations for your cloud environment.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

OnX USA LLC

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

Comparing Email Archiving Software with General Archiving Software
sponsored by Symantec Corporation
EGUIDE: Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

CW Europe - November Edition
sponsored by TechTarget ComputerWeekly.com
EZINE: The November 2012 edition of CWEurope focuses on what should always be one of your top IT priorities: Disaster recovery. Without a plan B, you risk the continuance of your business in the event of a natural disaster, hardware malfunction, human error or digital threat. It's disaster recovery or disaster devastation - the choice is up to you.
Posted: 19 Nov 2012 | Published: 01 Nov 2012

TechTarget ComputerWeekly.com

Secure your data – protect your business
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

TechTarget ComputerWeekly.com

Extending Tape Life with Cloud Computing
sponsored by NTT America, Inc.
EGUIDE: This expert SearchDisasterRecovery.com E-Guide, featuring ESG Senior Analyst Terri McClure, discusses tape's future, including the latest innovations in tape. Check it out to explore cloud-based data protection and disaster recovery approaches, and discover the five crucial "R"s to address during a crisis.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

NTT America, Inc.

Presentation Transcript: Virtualize Mission-Critical Applications With Confidence
sponsored by DataCore Software Corporation
PRESENTATION TRANSCRIPT: This brief paper contains insight into the most effective way to overcome the storage-related problems causing virtualized business-critical applications to run poorly.  The paper describes how to shape storage behavior to achieve the desired speed and predictable response users expect.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

DataCore Software Corporation

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

Five data protection guidelines for business continuity - Presentation Transcript
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

DellEMC and Intel®

Cornell University Chooses Red Hat Storage for Demanding HPC Environment
sponsored by Red Hat
CASE STUDY: In this case study, learn how a New York University found a storage solution that helped to promote research, education and technology transfer in biotech, and explore the solution that's robust enough to perform DNA sequencing, proteomics and imaging.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Red Hat