IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
151 - 175 of 306 Matches Previous Page  |  Next Page
Maximize the Availability of Health Data While Minimizing Storage Costs
sponsored by IBM
WHITE PAPER: The data storage requirements for a healthcare provider are among the largest and most demanding in any industry. Read this comprehensive white paper to explore new, cost-cutting ways to manage, protect, and preserve your electronic health information.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

IBM

A Paradigm Shift in Digital Asset Storage
sponsored by Cleversafe
WHITE PAPER: New trends in electronic business communication and consumer interaction are creating the need for new methods of data storage. A new technology offered by Cleversafe can effectively change the data storage landscape, offering reliable, secure, cost-effective solutions to companies struggling to keep up with continuing increases in data.
Posted: 05 Oct 2011 | Published: 01 Jun 2008

Cleversafe

Creating and Testing Your IT Recovery Plan
sponsored by QuorumLabs
WHITE PAPER: Regular tests of your IT disaster recovery plan can mean the difference between a temporary inconvenience or going out of business. Read this white paper to learn how to create and implement a successful DR plan to ensure your business is prepared.
Posted: 05 Oct 2011 | Published: 04 Oct 2011

QuorumLabs

Driving Down Enterprise Storage TCO with the IBM XIV Storage System
sponsored by IBM
WHITE PAPER: This comprehensive white paper explores how the IBM XIV system's unique architecture and approach to storage enable it to accomplish a better bottom line for you and your business.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

IBM

HP Data Protector Guide to Virtual Server Protection
sponsored by HP
WHITE PAPER: HP Data Protector software, a key component of the HP Information Management solutions portfolio, helps you protect enterprise information in both physical and virtual environments. Read this white paper to learn more.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

HP

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to explore how to make sure your backup and recovery system protects all of your data, all of the time.
Posted: 21 Sep 2011 | Published: 20 Sep 2011

Symantec Corporation

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Websense, Inc.

Optimize Your Infrastructure Through Consolidation and Tiered Storage
sponsored by IBM
WHITE PAPER: The exploding volume, velocity and variety of data requires optimized systems specifically architected for smarter computing. You need to maximize performance and efficiency in order to balance storage cost and performance. Read this white paper to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

IBM

Employee Use of Personal Devices: Managing risk by balancing privacy and security
sponsored by McAfee, Inc.
WHITE PAPER: Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

McAfee, Inc.

How to Choose a Cloud Backup Provider
sponsored by Asigra
WHITE PAPER: Many people think the only question is to ask when thinking about backup and recovery is "What is the best way to make backups?" That’s certainly a critical question but business data is the very lifeblood of your business. You can’t afford to look at only half the equation. Recovery is vital as well, especially when choosing a cloud provider.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Asigra

IDC Disaster Recovery: Improving Time-to-Readiness
sponsored by EMC Corporation
WHITE PAPER: Read this IDC Analyst Connection to learn how using deduplication storage for data protection can help organizations efficiently manage their growing data volumes and handle disaster recovery scenarios.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

EMC Corporation

The Costs and Implications of EHR System Downtime on Physician Practices
sponsored by Stratus Technologies
WHITE PAPER: The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

McAfee Cloud Security Platform
sponsored by McAfee, Inc.
WHITE PAPER: View this paper to explore how McAfee® Cloud Security Platform can help organizations take advantage of the cloud safely and confidently by extending existing security practices and policies to data flowing to and from the cloud.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

McAfee, Inc.

Myth Busted: Affordable, Easy to Manage Virtualization with High-Availability is a Reality
sponsored by Stratus Technologies
WHITE PAPER: SMBs want to take advantage of the benefits of virtualization but it can be costly to manage if they do not have the required skills in-house. Dan Kusnetzky takes a deep look at all of the benefits as well as the issues these businesses are facing, including the requirement to use automated systems, reducing complexity and maintaining availability.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

IBM XIV Storage System: Engineered for Business Continuity
sponsored by IBM
WHITE PAPER: This comprehensive white paper explores the factors to consider and the evaluations needed to make informed decisions to minimize downtime, prevent technological mishaps, and compensate for natural or man-made disasters.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches
sponsored by Boldon James
WHITE PAPER: In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.
Posted: 20 Jul 2011 | Published: 20 Jul 2011


Easy DLP - Data Protection Loss
sponsored by Boldon James
WHITE PAPER: This paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.
Posted: 19 Jul 2011 | Published: 19 Jul 2011


Beyond Deduplication - Rethinking Data Protection
sponsored by Syncsort UK
WHITE PAPER: Most users are still deploying data protection technology that was crafted decades ago. This white paper reviews new potential data protection solutions for your organization.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

Syncsort UK

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk
sponsored by Websense, Inc.
WHITE PAPER: Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

A Buyer's Guide to Data Loss Protection Solutions
sponsored by Websense, Inc.
WHITE PAPER: Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM

IT Handbook: Cloud Computing Security Up Close
sponsored by Intel
WHITE PAPER: This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Intel

Building Your Backup and Disaster Recovery Plan 101
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
Posted: 04 Jul 2011 | Published: 30 Jun 2011

StorageCraft Technology Corporation
151 - 175 of 306 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement