IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
1 - 25 of 407 Matches Previous Page  |  Next Page
IBM Data Protection for Virtual Environments
sponsored by IBM
WHITE PAPER: Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.
Posted: 24 May 2016 | Published: 31 Jul 2015

IBM

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

SANS Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by TrendMicro
WHITE PAPER: Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.
Posted: 24 May 2016 | Published: 01 Feb 2016

TrendMicro

Protecting Valuable Data Assets
sponsored by Intel Security
WHITE PAPER: Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

Complete Data Protection
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When Visibility is not Enough: Taking Control of Your Data
sponsored by Intel Security
WHITE PAPER: In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

IDC: Protecting Your SaaS Applications
sponsored by TrendMicro
WHITE PAPER: Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.
Posted: 20 May 2016 | Published: 31 Dec 2015

TrendMicro

Moving from Monitoring to Blocking Content - 5 Best Practices
sponsored by Intel Security
WHITE PAPER: Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Protect Company Data with Encryption & Remote Management
sponsored by Intel Security
WHITE PAPER: Simplify your security enterprise security management with broad, centralized control with stronger and more efficient options for protecting endpoints. Stay ahead of emerging threats and improve user experience all will lowering the TCO to your organization.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
sponsored by Intel Security
WHITE PAPER: DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.
Posted: 19 May 2016 | Published: 31 Dec 2015

Intel Security

Five Tips to Help Protect Your Data - From passive monitoring to proactive protection
sponsored by Intel Security
WHITE PAPER: Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

Protect Your Sensitive Data a Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization
sponsored by Gemalto
WHITE PAPER: Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Ten ways to save money with IBM data protection
sponsored by IBM
WHITE PAPER: Discover 10 ways you can employ your data protection system to help you organize files while addressing modern data protection challenges, and save money.
Posted: 17 May 2016 | Published: 31 Jul 2015

IBM

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Understanding How IBM Spectrum Protect Enables Hybrid Data Protection
sponsored by IBM
WHITE PAPER: Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.
Posted: 16 May 2016 | Published: 31 Aug 2015

IBM

Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Data Restoration Services: Vendor Guide for IT
sponsored by Iron Mountain
WHITE PAPER: Discover a data restoration solution that eliminates resource-consuming legacy systems while still providing access to archived data. Access now to discover the benefits this solution can provide to your enterprise, including reduced data center power/cooling costs, faster responses to restore requests, consolidated silos of tape, and more.
Posted: 13 May 2016 | Published: 13 May 2016

Iron Mountain

Making the Case for Cloud-to-Cloud Backup
sponsored by Datto, Inc.
WHITE PAPER: Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.
Posted: 12 May 2016 | Published: 11 Dec 2015

Datto, Inc.

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: Your IT team needs to settle on a file sync and sharing solution to prevent data breaches. Access this white paper to discover the top 5 requirements that IT should look for in an enterprise data sync and sharing solution.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise. Physical security and firewalls aren't enough. Micro-segmentation is one of the breakthrough security benefits of network virtualization. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware
1 - 25 of 407 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement