IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
51 - 75 of 414 Matches Previous Page  |  Next Page
Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

It’s Time to Get Real With SDN and NFV
sponsored by Accelerated Concepts
WHITE PAPER: This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.
Posted: 04 May 2016 | Published: 01 Apr 2016

Accelerated Concepts

Advanced Threats: Integrating a Sandbox into your Infrastructure
sponsored by Fortinet, Inc.
WHITE PAPER: Protect against advances threats with a combination of proactive mitigation, visibility and rich reporting. Learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Email Threats: Key features of an email gateway security solution
sponsored by LogicNow
WHITE PAPER: What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.
Posted: 02 May 2016 | Published: 01 Apr 2016

LogicNow

Global IT Security Risks Survey Report
sponsored by Kaspersky Lab
WHITE PAPER: This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

What Is the Cost of One More Test?
sponsored by Ixia
WHITE PAPER: This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.
Posted: 02 May 2016 | Published: 01 Apr 2016

Ixia

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Stop Thinking About Your Backups: It's Time to Focus On Recovery
sponsored by Dell Software
WHITE PAPER: This brief white paper highlights four major areas where enterprises should redefine recovery goals, including recovery time objective (RTO), recovery point objective (RPO), day-to-day restoration, and disaster recovery. Read on to learn how you can ensure a more efficient and secure backup and recovery process.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Dell Software

Beware the Invisible Cybercriminals: Cyberespionage and Your Business
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Overview of the Asia-Pacic Intrusion Detection & Prevention Systems Market
sponsored by IBM
WHITE PAPER: This white paper shows you how greatly IDS/IPS is growing in Asia Pacific and methods they are using to stay ahead of advanced threats. Access now and learn how to improve your organization's awareness of these threats and prepare yourself against sophisticated attacks in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

The Power of Collaboration with an Expiration Date
sponsored by BlackBerry
WHITE PAPER: As more and more enterprises move toward collaboration methods that incorporate revocation or expiration, the enterprise file synchronization and sharing (EFSS) space is moving in that direction as well.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM
51 - 75 of 414 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement