IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)White Papers (View All Report Types)
151 - 175 of 348 Matches Previous Page  | Next Page
Is Your Complete Restoration Plan on Track?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Risk Management: How Vulnerable is Your Backup Media?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Plan Now, Worry Less After
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a guide to compiling a successful post-disaster checklist. Receive 4 post-disaster musts, learn 3 keys to staying afloat following a disaster, discover the importance of internal communication during downtime and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Send Your Tapes to a Better Climate
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a checklist of key questions to ask before choosing an offsite tape storage partner. Learn what the ideal requirements for tape storage are, discover what you should be looking for in a potential storage partner and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

The Lowdown on Compliant Data Storage
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success with the right data backup and recovery systems. Inside, learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Who's Got the Talent? Build an A-List Backup Team
sponsored by Iron Mountain
WHITE PAPER: The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Remote and Branch Office Backup and Recovery 101
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices when planning and managing a comprehensive offsite backup and recovery strategy. Learn how careful planning with remote or branch offices (ROBOs) can allow for seamless data protection without compromise, and discover key questions to ask when planning remote office backup strategies.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Eguide: Why Choosing a Data Protection Solution is Critical
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn about the importance of proper data protection practices and receive tips to help you devise the best strategy to protect your most important information. Read on to learn more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Which Way to the Vault? Hassle-free Tape Backups
sponsored by Iron Mountain
WHITE PAPER: Loaded with a step-by-step list of how to prepare, move and keep tabs on your data, along with four best practices for moving data to an offsite vault, this resource has the information you need to ensure you're properly transporting and managing offsite tapes.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Security and Data Protection with Intelligent Desktop Virtualization
sponsored by Virtual Computer, Inc.
WHITE PAPER: The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.
Posted: 24 Feb 2012 | Published: 01 Jan 2012

Virtual Computer, Inc.

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

ESG Lab validation Report: Cost-effective Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: ExaGrid is a cost-effective, scalable disk-based backup solution that replaces tape in your nightly backup process, enabling faster and more reliable backups at a price comparable to a new tape library. ExaGrid offers the only disk backup appliance with data deduplication purpose.
Posted: 07 Feb 2012 | Published: 01 Dec 2011

ExaGrid Systems, Inc.

ExaGrid Systems Named Champion in Disk Backup Vendor Landscape by Info-Tech Research Group
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: As a Disk Backup Champion, ExaGrid received the highest rating from Info-Tech Research Group for its exceptional product architecture and overall vendor score highlighting the company’s ‘exemplary’ strategy and strong viability, reach and channel. Read on to learn more.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

ExaGrid Systems Awarded Best-in-Class Rating in DCIG 2011 Midrange Deduplication Appliance Buyer’s Guide
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: The 2011 Midrange Deduplication Appliance Buyer’s Guide rated the ExaGrid EX13000E “Best-in-Class” out of 37 different deduplication solutions for its functionality and capability. All ExaGrid appliances rated as “Recommended” scoring a 9.8 in technical support. ExaGrid rated as “Excellent” for hardware across all products. Read on to learn more.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

Five Keys to Scalability and Disk-Based Backup Systems
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: In selecting a disk-based backup solution, it's critical to consider the scalability of each prospective solution to ensure that it will meet the needs of your organization now and into the future. This paper outlines the five key questions you should ask when evaluating the scalability of any disk-based backup solution.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

Understanding the Reasons Behind Data Loss Disasters
sponsored by Websense, Inc.
WHITE PAPER: While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Websense, Inc.

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

McAfee.

10 Reasons to Deploy WAN Optimization for Disaster Recovery
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Data protection is simple: take everything and copy it somewhere far enough away so that you’ll have it in an emergency. The challenge is how to do this in an efficient and reliable way. Learn Riverbed optimizes DR across the widest range of backup mechanisms, with no changes to your software or storage
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Solving Security Challenges for Government Cloud-Based IT Environments
sponsored by Red Hat
WHITE PAPER: Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Red Hat

Efficient Management of Legal and Compliance Requests on D2D Storage
sponsored by Index Engines
WHITE PAPER: This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Index Engines

EMC Isilon OneFS Operating System - Powering the Isilon Scale-out Storage Platform
sponsored by EMC Isilon
WHITE PAPER: This white paper provides an introduction to the EMC Isilon OneFS operating system, the foundation of the Isilon scale-out storage platform. In this paper, you'll learn about the benefits of storage scaling and gain an overview of the architecture of this platform.
Posted: 12 Dec 2011 | Published: 01 Apr 2011

EMC Isilon

Competing in the Expanding Universe of Digital Information and Big Data
sponsored by EMC Isilon
WHITE PAPER: This IDC white paper breaks down everything big data - learn exactly how big data is defined, and how to utilize big data technologies in order to create long-term organizational and economic value. This white paper also explores what types of organizations can benefit most from big data technologies - read on for more.
Posted: 12 Dec 2011 | Published: 01 Oct 2011

EMC Isilon
151 - 175 of 348 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement