IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
1 - 25 of 369 Matches Previous Page  |  Next Page
Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016

NTT ICT

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Privileged Users
sponsored by Forcepoint
WHITE PAPER: Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

The Cost of Unintentional Insider Threat
sponsored by Forcepoint
WHITE PAPER: A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.
Posted: 28 Jun 2016 | Published: 13 Jan 2016

Forcepoint

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Integrating Data Protection and Active Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Critical Capabilities for Enterprise Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. This research evaluates DLP products for these three use cases, based on nine critical capabilities. Read on to learn more.
Posted: 31 May 2016 | Published: 31 May 2016

Digital Guardian

Integrating Host Systems With Modern Security Frameworks
sponsored by Novell Ltd.
WHITE PAPER: This white paper reveals a practical way to bring your host systems into the modern security fold. Close the technology gap without jeopardizing business operations.
Posted: 31 May 2016 | Published: 01 Apr 2016

Novell Ltd.

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

IDC: Protecting Your SaaS Applications
sponsored by TrendMicro
WHITE PAPER: Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.
Posted: 20 May 2016 | Published: 31 Dec 2015

TrendMicro

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

A Step-By-Step Guide to Finding the Right Data Protection System
sponsored by Gemalto
WHITE PAPER: Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

8 Key Functions to Prevent Data Loss with User Behavior
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam
1 - 25 of 369 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement