IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)White Papers (View All Report Types)
126 - 150 of 356 Matches Previous Page  | Next Page
How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by SearchSecurity.com
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

Secure By Design: Building Identity-based Security into Today’s Information Systems
sponsored by IBM
WHITE PAPER: Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

IBM

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

Why tape is still necessary for successful backup solution
sponsored by Iron Mountain
WHITE PAPER: Access this brief paper to uncover 4 reasons to keep tape as part of your backup strategy.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

Iron Mountain

Delivering Enterprise Information Securely on Android and Apple iOS Devices
sponsored by Citrix
WHITE PAPER: This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control.
Posted: 16 Oct 2012 | Published: 30 Apr 2012

Citrix

Exploring new web browser security capabilities
sponsored by SearchSecurity.com
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

SearchSecurity.com

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices
sponsored by Iron Mountain
WHITE PAPER: This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Protecting Your Information as if It Were Our Own
sponsored by Iron Mountain
WHITE PAPER: This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This resource demonstrates how organizations can expand the reach of their security teams with improved data loss prevention offering advanced reporting, improved usability and new security integrations.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

Symantec Corporation

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

Select the right solution for endpoint management
sponsored by IBM
WHITE PAPER: Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

5 Key Steps for Moving Away From Tape Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Access this 5-step guide to making the transition from tape to disk with dedupe backups. Read on to explore the drawbacks of tape backup and to learn the key functional requirements of a disk backup system with deduplication.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

ExaGrid Systems, Inc.

Mobile Device Management Cloud Report
sponsored by Zenprise
WHITE PAPER: This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Zenprise

8 Considerations for Evaluating Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this white paper for 8 critical considerations to keep in mind before deciding on a disk-based backup appliance. Explore the importance of backup, restore, dedupe and scalability capabilities when shopping for a backup solution, and gain the insight you need to make a confident and informed decision when it comes to backup.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

ExaGrid Systems, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012

Zenprise

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

How to Regain IT Control in an Increasingly Mobile World
sponsored by BlackBerry
WHITE PAPER: Learn how to balance IT control and the end user experience while managing the data control problem brought on by today's increasingly mobile world in this white paper.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

BlackBerry

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Learn how to reduce your amount of at-risk data with a disaster recovery solution that offers these four key capabilities and four essential features.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Dell AppAssure Backup, Replication and Recovery Software

Best Practices for Shared Infrastructure Data Storage in the Federal Government
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn how to establish the most effective shared infrastructure data storage environment. Explore new best practices and how they can dramatically improve the cost, flexibility and environmental impact of an overall cloud architecture.
Posted: 03 Jul 2012 | Published: 01 Dec 2011

NetApp

Virtual Success in the Healthcare Provider Market
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn why and how virtualization is a logical investment for hospitals and health care providers. Learn the benefits specific to desktop virtualization in a health facility and access a case study regarding a medical center that adopted virtualization technology.
Posted: 29 Jun 2012 | Published: 01 Feb 2011

NetApp

Solving Agencies’ Big Data Challenges: PED for On-the-Fly Decisions
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn how to harness the valued intelligence from huge sets of data and learn about a storage solution designed to help turn ISR data into quality information that can be used for better decision-making.
Posted: 28 Jun 2012 | Published: 01 Mar 2012

NetApp

Defending Data on iOS
sponsored by WatchDox
WHITE PAPER: Learn why – despite the relatively secure nature of the system – it is vital to include iOS in your data security policies. Uncover best practices for securing data on these consumer-owned smartphones and tablets as well as a variety of options to help you achieve this.
Posted: 15 Jun 2012 | Published: 14 Jun 2012

WatchDox

Microsoft MVP Expert Guide: Windows Server 2008 Backup for VM and Physical Servers
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Gain insight into backup for virtual machines and physical servers in this 10-tip guide.
Posted: 25 May 2012 | Published: 25 May 2012

Dell AppAssure Backup, Replication and Recovery Software

VMware and Hyper-V Backups: How VM-Level Can Be Better Than Host-Level Backup
sponsored by Dell AppAssure Backup, Replication and Recovery Software
WHITE PAPER: Get Greg Shields' answers to agent-based vs. agentless VMware and Hyper-V backup questions in this white paper.
Posted: 25 May 2012 | Published: 25 May 2012

Dell AppAssure Backup, Replication and Recovery Software
126 - 150 of 356 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement