IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
1 - 25 of 329 Matches Previous Page  |  Next Page
10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Dissecting the Foundation of an Adaptive Data Loss Prevention Strategy
sponsored by Clearswift
WHITE PAPER: This white paper reveals the foundation of adaptive data loss prevention strategy.
Posted: 26 May 2015 | Published: 30 Apr 2015

Clearswift

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Top Marketing Data Collaboration Challenges
sponsored by IntraLinks, Inc
WHITE PAPER: In this whtie paper, discover the 6 data security and control challenges that marketing departments face and how to reduce risk and loss.
Posted: 15 May 2015 | Published: 06 May 2015

IntraLinks, Inc

Data and Document Governance for Legal Departments
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative strategy to data and document governance to reduce risk for legal departments.
Posted: 15 May 2015 | Published: 08 Apr 2015

IntraLinks, Inc

Mitigating Data Sharing Risks and Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative approach to reducing data sharing risks between internal teams and outside parties. View now to learn how to safeguard data and files and minimize leaks.
Posted: 14 May 2015 | Published: 25 Mar 2015

IntraLinks, Inc

The Collaborative Data Privacy Handbook
sponsored by IntraLinks, Inc
WHITE PAPER: As more organizations share sensitive data, the risk of leak or theft increases.  This white paper outlines six steps to improving data privacy and sharing principles and preventing regulatory and market sanctions.
Posted: 13 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER: This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014

Absolute Software

Financial Organizations: Controlling Secure Communications
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.
Posted: 04 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Securing #GenMobile: Is Your Business Running the Risk?
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines a 5 step mobile security strategy to mitigating the risks created by #GenMobile. View now to learn how to adapt your data protection to prevent loss.
Posted: 23 Apr 2015 | Published: 25 Feb 2015

Aruba Networks

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Licensing: The Next Great Disruptor to the Data Protection Status Quo
sponsored by Asigra
WHITE PAPER: This white paper takes you through the history of licensing and how current trends are shaping the future model on the horizon. View now to learn what's in store for licensing costs.
Posted: 03 Apr 2015 | Published: 04 Dec 2013

Asigra

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage

Lightning Fast Recovery To and From the Cloud
sponsored by Vision Solutions
WHITE PAPER: Access this helpful resource today to learn the secret to restoring your systems to normal operating capacity quickly and painlessly following an outage.
Posted: 27 Mar 2015 | Published: 30 Dec 2011

Vision Solutions

Going Mobile: Best Practices for Centrally Ensuring a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: With the uptick in Bring Your Own Device (BYOD) practices, IT is inundated with the responsibility of ensuring the portability of their business resources. Access this informative infographic to learn what it takes to effectively unify management of all endpoints no matter where they may reside.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

FrontRange Solutions Inc.
1 - 25 of 329 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement