IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
151 - 175 of 312 Matches Previous Page  |  Next Page
Maximize the Availability of Health Data While Minimizing Storage Costs
sponsored by IBM
WHITE PAPER: The data storage requirements for a healthcare provider are among the largest and most demanding in any industry. Read this comprehensive white paper to explore new, cost-cutting ways to manage, protect, and preserve your electronic health information.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

IBM

Data Security and Privacy: A Holistic Approach
sponsored by IBM
WHITE PAPER: This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk.
Posted: 09 Nov 2011 | Published: 01 Sep 2011

IBM

Best Practices for a Successful DLP Deployment
sponsored by TITUS
WHITE PAPER: This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start.
Posted: 08 Nov 2011 | Published: 08 Nov 2011

TITUS

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation

Information Classification: Delivering Security and Business Value
sponsored by Boldon James
WHITE PAPER: This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


Selecting the right DLP solution: Enterprise, Lite, or Channel?
sponsored by Websense, Inc.
WHITE PAPER: DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.
Posted: 06 Oct 2011 | Published: 06 Oct 2011

Websense, Inc.

A Paradigm Shift in Digital Asset Storage
sponsored by Cleversafe
WHITE PAPER: New trends in electronic business communication and consumer interaction are creating the need for new methods of data storage. A new technology offered by Cleversafe can effectively change the data storage landscape, offering reliable, secure, cost-effective solutions to companies struggling to keep up with continuing increases in data.
Posted: 05 Oct 2011 | Published: 01 Jun 2008

Cleversafe

Creating and Testing Your IT Recovery Plan
sponsored by QuorumLabs
WHITE PAPER: Regular tests of your IT disaster recovery plan can mean the difference between a temporary inconvenience or going out of business. Read this white paper to learn how to create and implement a successful DR plan to ensure your business is prepared.
Posted: 05 Oct 2011 | Published: 04 Oct 2011

QuorumLabs

Driving Down Enterprise Storage TCO with the IBM XIV Storage System
sponsored by IBM
WHITE PAPER: This comprehensive white paper explores how the IBM XIV system's unique architecture and approach to storage enable it to accomplish a better bottom line for you and your business.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

IBM

HP Data Protector Guide to Virtual Server Protection
sponsored by HP
WHITE PAPER: HP Data Protector software, a key component of the HP Information Management solutions portfolio, helps you protect enterprise information in both physical and virtual environments. Read this white paper to learn more.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

HP

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to explore how to make sure your backup and recovery system protects all of your data, all of the time.
Posted: 21 Sep 2011 | Published: 20 Sep 2011

Symantec Corporation

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Websense, Inc.

Optimize Your Infrastructure Through Consolidation and Tiered Storage
sponsored by IBM
WHITE PAPER: The exploding volume, velocity and variety of data requires optimized systems specifically architected for smarter computing. You need to maximize performance and efficiency in order to balance storage cost and performance. Read this white paper to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

IBM

Employee Use of Personal Devices: Managing risk by balancing privacy and security
sponsored by McAfee, Inc.
WHITE PAPER: Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

McAfee, Inc.

How to Choose a Cloud Backup Provider
sponsored by Asigra
WHITE PAPER: Many people think the only question is to ask when thinking about backup and recovery is "What is the best way to make backups?" That’s certainly a critical question but business data is the very lifeblood of your business. You can’t afford to look at only half the equation. Recovery is vital as well, especially when choosing a cloud provider.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Asigra

IDC Disaster Recovery: Improving Time-to-Readiness
sponsored by EMC Corporation
WHITE PAPER: Read this IDC Analyst Connection to learn how using deduplication storage for data protection can help organizations efficiently manage their growing data volumes and handle disaster recovery scenarios.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

EMC Corporation

The Costs and Implications of EHR System Downtime on Physician Practices
sponsored by Stratus Technologies
WHITE PAPER: The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

McAfee Cloud Security Platform
sponsored by McAfee, Inc.
WHITE PAPER: View this paper to explore how McAfee® Cloud Security Platform can help organizations take advantage of the cloud safely and confidently by extending existing security practices and policies to data flowing to and from the cloud.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

McAfee, Inc.

Myth Busted: Affordable, Easy to Manage Virtualization with High-Availability is a Reality
sponsored by Stratus Technologies
WHITE PAPER: SMBs want to take advantage of the benefits of virtualization but it can be costly to manage if they do not have the required skills in-house. Dan Kusnetzky takes a deep look at all of the benefits as well as the issues these businesses are facing, including the requirement to use automated systems, reducing complexity and maintaining availability.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

IBM XIV Storage System: Engineered for Business Continuity
sponsored by IBM
WHITE PAPER: This comprehensive white paper explores the factors to consider and the evaluations needed to make informed decisions to minimize downtime, prevent technological mishaps, and compensate for natural or man-made disasters.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Easy DLP - Data Protection Loss
sponsored by Boldon James
WHITE PAPER: This paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.
Posted: 19 Jul 2011 | Published: 19 Jul 2011


Beyond Deduplication - Rethinking Data Protection
sponsored by Syncsort UK
WHITE PAPER: Most users are still deploying data protection technology that was crafted decades ago. This white paper reviews new potential data protection solutions for your organization.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

Syncsort UK
151 - 175 of 312 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement