IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
151 - 175 of 331 Matches Previous Page  |  Next Page
Security and Data Protection with Intelligent Desktop Virtualization
sponsored by Virtual Computer, Inc.
WHITE PAPER: The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.
Posted: 24 Feb 2012 | Published: 01 Jan 2012

Virtual Computer, Inc.

HP 3Par Secure Service Architecture
sponsored by HP and Intel®
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel®

ESG Lab validation Report: Cost-effective Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: ExaGrid is a cost-effective, scalable disk-based backup solution that replaces tape in your nightly backup process, enabling faster and more reliable backups at a price comparable to a new tape library. ExaGrid offers the only disk backup appliance with data deduplication purpose.
Posted: 07 Feb 2012 | Published: 01 Dec 2011

ExaGrid Systems, Inc.

ExaGrid Systems Named Champion in Disk Backup Vendor Landscape by Info-Tech Research Group
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: As a Disk Backup Champion, ExaGrid received the highest rating from Info-Tech Research Group for its exceptional product architecture and overall vendor score highlighting the company’s ‘exemplary’ strategy and strong viability, reach and channel. Read on to learn more.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

ExaGrid Systems Awarded Best-in-Class Rating in DCIG 2011 Midrange Deduplication Appliance Buyer’s Guide
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: The 2011 Midrange Deduplication Appliance Buyer’s Guide rated the ExaGrid EX13000E “Best-in-Class” out of 37 different deduplication solutions for its functionality and capability. All ExaGrid appliances rated as “Recommended” scoring a 9.8 in technical support. ExaGrid rated as “Excellent” for hardware across all products. Read on to learn more.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

Five Keys to Scalability and Disk-Based Backup Systems
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: In selecting a disk-based backup solution, it's critical to consider the scalability of each prospective solution to ensure that it will meet the needs of your organization now and into the future. This paper outlines the five key questions you should ask when evaluating the scalability of any disk-based backup solution.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

Understanding the Reasons Behind Data Loss Disasters
sponsored by Websense, Inc.
WHITE PAPER: While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Websense, Inc.

Protecting Information from Insider Threats
sponsored by McAfee.
WHITE PAPER: Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

McAfee.

10 Reasons to Deploy WAN Optimization for Disaster Recovery
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Data protection is simple: take everything and copy it somewhere far enough away so that you’ll have it in an emergency. The challenge is how to do this in an efficient and reliable way. Learn Riverbed optimizes DR across the widest range of backup mechanisms, with no changes to your software or storage
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Solving Security Challenges for Government Cloud-Based IT Environments
sponsored by Red Hat
WHITE PAPER: Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Red Hat

Efficient Management of Legal and Compliance Requests on D2D Storage
sponsored by Index Engines
WHITE PAPER: This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Index Engines

EMC Isilon OneFS Operating System - Powering the Isilon Scale-out Storage Platform
sponsored by EMC Isilon
WHITE PAPER: This white paper provides an introduction to the EMC Isilon OneFS operating system, the foundation of the Isilon scale-out storage platform. In this paper, you'll learn about the benefits of storage scaling and gain an overview of the architecture of this platform.
Posted: 12 Dec 2011 | Published: 01 Apr 2011

EMC Isilon

Competing in the Expanding Universe of Digital Information and Big Data
sponsored by EMC Isilon
WHITE PAPER: This IDC white paper breaks down everything big data - learn exactly how big data is defined, and how to utilize big data technologies in order to create long-term organizational and economic value. This white paper also explores what types of organizations can benefit most from big data technologies - read on for more.
Posted: 12 Dec 2011 | Published: 01 Oct 2011

EMC Isilon

Symantec SMB Threat Awareness Poll
sponsored by Symantec Corporation
WHITE PAPER: Symantec conducted its SMB Threat Awareness Poll in September 2011, asking 1,900 SMBs how familiar they are with threats, and what they are doing to protect themselves. This white paper features the results of this survey, and provides best practices and recommendations to help your organization's data stay secure. Read on to learn more.
Posted: 01 Dec 2011 | Published: 22 Nov 2011

Symantec Corporation

Simplifying Storage Management for Virtual Environments
sponsored by Dell, Inc.
WHITE PAPER: This white paper is here to help you stay on top of your virtualized environment. In this paper you'll learn how integrated storage management from a single console can help reduce administrative costs, simplify management and boost performance and availability.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Dell, Inc.

Simplifying Management Through Windows Storage Consolidation on Dell Powervault NX3000 Nas Appliances
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides a brief introduction to several technologies that can help you reap the benefits of storage consolidation. Read on to learn the keys to creating a unified storage infrastructure, and how to lower costs throughout your storage infrastructure without compromising efficiency or performance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Dell, Inc.

Solid State Disks and Storage Tiering
sponsored by Dell, Inc.
WHITE PAPER: Check out this white paper for a technical introduction to storage tiering and its implementation. You'll learn exactly how tiered storage works, and how to determine if it's the right strategy for your organization. Finally, you'll receive recommendations on how to evaluate available tiered solutions and determine which will best meet your needs.
Posted: 30 Nov 2011 | Published: 30 Nov 2011

Dell, Inc.

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Improving Deduplication Performance in Virtual Environments with Symantec Backup Exec 2010 R3
sponsored by Symantec Corporation
WHITE PAPER: Check out this white paper for an introduction to source dedupe and a list of the benefits it can provide. You will see several real-world scenarios in which source dedupe is utilized to solve the challenges associated with older, obsolete backup methods, and learn about the differences between deduping in a physical and virtual environment.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Data Security and Privacy: A Holistic Approach
sponsored by IBM
WHITE PAPER: This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk.
Posted: 09 Nov 2011 | Published: 01 Sep 2011

IBM

Best Practices for a Successful DLP Deployment
sponsored by TITUS
WHITE PAPER: This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start.
Posted: 08 Nov 2011 | Published: 08 Nov 2011

TITUS

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation

Information Classification: Delivering Security and Business Value
sponsored by Boldon James
WHITE PAPER: This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

151 - 175 of 331 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement