IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)White Papers (View All Report Types)
126 - 150 of 345 Matches Previous Page  | Next Page
Protecting Your Information as if It Were Our Own
sponsored by Iron Mountain
WHITE PAPER: This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Is Your Complete Restoration Plan on Track?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Risk Management: How Vulnerable is Your Backup Media?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Plan Now, Worry Less After
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a guide to compiling a successful post-disaster checklist. Receive 4 post-disaster musts, learn 3 keys to staying afloat following a disaster, discover the importance of internal communication during downtime and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Select the right solution for endpoint management
sponsored by IBM
WHITE PAPER: Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

5 Key Steps for Moving Away From Tape Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Access this 5-step guide to making the transition from tape to disk with dedupe backups. Read on to explore the drawbacks of tape backup and to learn the key functional requirements of a disk backup system with deduplication.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

ExaGrid Systems, Inc.

Mobile Device Management Cloud Report
sponsored by Zenprise
WHITE PAPER: This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Zenprise

8 Considerations for Evaluating Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this white paper for 8 critical considerations to keep in mind before deciding on a disk-based backup appliance. Explore the importance of backup, restore, dedupe and scalability capabilities when shopping for a backup solution, and gain the insight you need to make a confident and informed decision when it comes to backup.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

ExaGrid Systems, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012

Zenprise

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

How to Regain IT Control in an Increasingly Mobile World
sponsored by BlackBerry
WHITE PAPER: Learn how to balance IT control and the end user experience while managing the data control problem brought on by today's increasingly mobile world in this white paper.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

BlackBerry

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Learn how to reduce your amount of at-risk data with a disaster recovery solution that offers these four key capabilities and four essential features.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Dell AppAssure Backup, Replication and Recovery Software

Best Practices for Shared Infrastructure Data Storage in the Federal Government
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn how to establish the most effective shared infrastructure data storage environment. Explore new best practices and how they can dramatically improve the cost, flexibility and environmental impact of an overall cloud architecture.
Posted: 03 Jul 2012 | Published: 01 Dec 2011

NetApp

Virtual Success in the Healthcare Provider Market
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn why and how virtualization is a logical investment for hospitals and health care providers. Learn the benefits specific to desktop virtualization in a health facility and access a case study regarding a medical center that adopted virtualization technology.
Posted: 29 Jun 2012 | Published: 01 Feb 2011

NetApp

Solving Agencies’ Big Data Challenges: PED for On-the-Fly Decisions
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn how to harness the valued intelligence from huge sets of data and learn about a storage solution designed to help turn ISR data into quality information that can be used for better decision-making.
Posted: 28 Jun 2012 | Published: 01 Mar 2012

NetApp

Defending Data on iOS
sponsored by WatchDox
WHITE PAPER: Learn why – despite the relatively secure nature of the system – it is vital to include iOS in your data security policies. Uncover best practices for securing data on these consumer-owned smartphones and tablets as well as a variety of options to help you achieve this.
Posted: 15 Jun 2012 | Published: 14 Jun 2012

WatchDox

Microsoft MVP Expert Guide: Windows Server 2008 Backup for VM and Physical Servers
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Gain insight into backup for virtual machines and physical servers in this 10-tip guide.
Posted: 25 May 2012 | Published: 25 May 2012

Dell AppAssure Backup, Replication and Recovery Software

VMware and Hyper-V Backups: How VM-Level Can Be Better Than Host-Level Backup
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Get Greg Shields' answers to agent-based vs. agentless VMware and Hyper-V backup questions in this white paper.
Posted: 25 May 2012 | Published: 25 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Best Practices for Shared Infrastructure Data Storage in the Federal Government
sponsored by MicroTech & Netapp
WHITE PAPER: Read this white paper to discover how the U.S. Federal Government is consolidating and improving storage operations with emerging virtualization and cloud technologies, and discover how similar solutions can benefit your business.
Posted: 07 May 2012 | Published: 31 Dec 2011

MicroTech & Netapp

Next-Generation Secure Web Gateways:The Case and Criteria for Embedded DLP with Advanced Malware Defenses
sponsored by Websense, Inc.
WHITE PAPER: While the Web has become a core business communication platform, it’s also a highly popular target for cybercriminals and hackers. This resource explores how to mitigate the risk of data loss over Web channels, uncovering the business need for DLP as part of Web Security Gateways and the key criteria to consider when choosing a solution.
Posted: 03 May 2012 | Published: 03 May 2012

Websense, Inc.

Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers
sponsored by Asigra
WHITE PAPER: This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings.
Posted: 18 Apr 2012 | Published: 30 Dec 2011

Asigra

Protecting Customer Data: Moving Beyond Compliance
sponsored by Voltage Security, Inc.
WHITE PAPER: The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

Voltage Security, Inc.

Beyond Deduplication Rethinking Data Protection
sponsored by Syncsort
WHITE PAPER: Check out this white paper for a look into the challenges associated with dedupe that are still plaguing administrators, and discover the direction deduplication may be headed in. Also learn today's best practices for establishing a successful backup and recovery strategy.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Syncsort

Five Things You Need to Know About Disaster Recovery Planning
sponsored by NetIQ
WHITE PAPER: Check out this white paper for 5 things you must know about DR planning. Learn how virtualisation and cloud technologies are affecting DR processes, discover how to measure the ROI of disaster recovery, receive best practices for effective planning and testing and more.
Posted: 09 Mar 2012 | Published: 09 Mar 2012

NetIQ

Intelligent Service Automation Working with Service Oriented Architecture
sponsored by Kaminario
WHITE PAPER: The dependency of background (batch) processing still remains when your applications move to a service oriented architecture (SOA). Read this white paper to learn how to ease the SOA transition with technology that enables the inclusion of background processing.
Posted: 05 Mar 2012 | Published: 31 Dec 2010

Kaminario
126 - 150 of 345 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement