IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
26 - 50 of 328 Matches Previous Page  |  Next Page
Data Loss Nightmares of a Salesforce.com Admin
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses 5 common nightmares every organization has regarding their data protection and the threat of a data loss. Read on to discover how to manage your data with an automatic cloud-to-cloud backup solution that will ensure your data is secure.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Datto, Inc.

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Getting Back to the Future When Disaster Strikes
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses how to secure your data in the cloud with cloud backup technology and provides 12 tips for successful data backup. Access now to see how implementing a reliable, documented back up program can ensure you avoid a data loss and keep your data secure.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Cloud-Based BCDR: The Transformative Technical Foundations
sponsored by NaviSite, Inc.
WHITE PAPER: In this white paper, you will discover the technical foundations you need to put in place in order to execute successful cloud-based BCDR. Read on to meet the new realities of BCDR in your enterprise and learn how to implement a stellar business resilience plan.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

NaviSite, Inc.

Resiliency in the Cloud
sponsored by IBM
WHITE PAPER: This white paper discusses the reality of cloud resilience and how you can take a structured approach to cloud resiliency. Download now to learn four key steps to plan and manage cloud resiliency.
Posted: 09 Dec 2015 | Published: 24 Jun 2015

IBM

CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

A New Guide To Evaluating MSSPs
sponsored by UnitedLex
WHITE PAPER: Ensure that an MSSP can overcome the top 5 obstacles of mitigating advanced attacks by studying this valuable evaluation guide. View now and learn the 8 questions you need to ask prospective MSSPs.
Posted: 21 Oct 2015 | Published: 07 Oct 2015

UnitedLex

Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014

Proofpoint, Inc.

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Increase Productivity and Reduce Risk with Secure File Sharing & Collaboration
sponsored by BlackBerry
WHITE PAPER: This white paper highlights an EFSS solution that allows you to take control over your data, combining the benefits of productivity and collaboration with security. Bolster your business against third-party threats with 6 steps for deploying secure EFSS.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

Enabling the Connected Campus: Mobility Best Practices for Higher Education
sponsored by VMware, Inc.
WHITE PAPER: IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

VMware, Inc.

8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Are You Getting the Most from Your Hybrid IT Environment?
sponsored by IBM
WHITE PAPER: In this white paper, you will discover how to find the right sourcing provider for your organization, and determine the effectiveness of managed service providers in hybrid IT environments. Access this paper now to take advantage of scalable service integration and cloud management.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Linking resiliency to business objectives: How to make a case for corporate investment
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WHITE PAPER: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Published: 05 Nov 2014

Digital Guardian

Financial Organizations: Controlling Secure Communications
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.
Posted: 04 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
26 - 50 of 328 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement