IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)White Papers (View All Report Types)
76 - 100 of 356 Matches Previous Page  | Next Page
Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Why and how to choose the right cloud vendor
sponsored by HP Autonomy
WHITE PAPER: Check out this informative resource to discover how to best choose a service provider for your cloud backup services.
Posted: 22 Aug 2013 | Published: 22 Aug 2013

HP Autonomy

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

LTFS Is a Game-Changing Technology: Extends Use Cases for Tape-Based Archiving
sponsored by Iron Mountain
WHITE PAPER: This informative white paper discusses LTFS by exploring its benefits and use cases for tape-based archiving.
Posted: 18 Jul 2013 | Published: 31 May 2013

Iron Mountain

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control
sponsored by CA Technologies.
WHITE PAPER: This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

CA Technologies.

Demystifying Deduplication for Backup with the Dell DR4000
sponsored by Dell Software
WHITE PAPER: A disruption in the availability of data can break business continuity. Any good impact analysis must consider how quickly data access can be restored and how recent the data must be. Tape backup is no longer effective for all scenarios, and disk-based backup presents challenges as well. Is data deduplication the answer? Read the White Paper
Posted: 23 Aug 2013 | Published: 31 Jan 2012

Dell Software

ESG Lab Validation Report: Dell PowerVaultDL4000 Appliance
sponsored by Dell Software
WHITE PAPER: IT teams today are faced with swelling data volumes and expanding virtualization, both of which complicate the protection landscape and challenge your staff's resources. The DL4000 protects both physical and virtual servers, nearly eliminating backup windows and providing recovery assurance for data and applications. Read the Report
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Top 3 Considerations When Building Business Continuity and Disaster Recovery Service Offerings
sponsored by CA Technologies.
WHITE PAPER: Check out this white paper to explore the top three things to consider whilst building your business continuity and disaster recovery strategies.
Posted: 08 Aug 2013 | Published: 30 Apr 2012

CA Technologies.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

EMC VSPEX Server Virtualization Solutions For Small and Medium Business
sponsored by OnX USA LLC
WHITE PAPER: This white paper discusses a pre-validated and modular architecture and its key capabilities that enable complete virtualization.
Posted: 31 Jul 2013 | Published: 29 Feb 2012

OnX USA LLC

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Five Critical Lessons in Disaster Recovery
sponsored by Iron Mountain
WHITE PAPER: This eBook explores what it takes to ensure you're in the best position to bounce back should disaster strike.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Leveraging the Cloud for Data Protection and Disaster recovery
sponsored by CA Technologies.
WHITE PAPER: This informative white paper provides insight into how to approach cloud resources for system, application and data protection.
Posted: 30 Jul 2013 | Published: 30 Mar 2012

CA Technologies.

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Top 5 Reasons Why EMC For Archiving
sponsored by EMC Corporation
WHITE PAPER: Check out this resource to learn the top five reasons to use a best-of-breed archive solution and protection storage to conquer the challenges surrounding big data.
Posted: 25 Jul 2013 | Published: 31 May 2013

EMC Corporation

Generating Proven Business Value with EMC Next-Generation Backup and Recovery
sponsored by EMC Corporation
WHITE PAPER: This white paper explores one vendor's family of next-generation backup and recovery solutions that have helped companies across all industries backup and protect their data.
Posted: 25 Jul 2013 | Published: 31 Oct 2011

EMC Corporation

EMC Best Practices in Data Protection Monitoring
sponsored by EMC Corporation
WHITE PAPER: This resource discusses the modern-day dilemma of multiple vendors in a backup and recovery environment and provides insight into one vendor's solution.
Posted: 25 Jul 2013 | Published: 28 Feb 2013

EMC Corporation

Cloud BDR for MSPs: Partner Support Makes the Difference
sponsored by Intronis
WHITE PAPER: This brief white paper provides deeper insight into solution providers, value-added resellers and MSPs implementing online backup as a cost-effective way to deliver a foundational IT service to SMB clients. Find out you can provide maximum value to customers while realizing optimal recurring revenues, profits and branding opportunities.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Intronis

Demonstrating Proven Business Value Through Backup Redesign with EMC: Dealing with an Ageing Tape Library
sponsored by EMC
WHITE PAPER: This white paper explores how one organization implemented a modernized backup solution to achieve significant efficiency gains and financial savings.
Posted: 22 Jul 2013 | Published: 30 Mar 2012

EMC

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Data Integrity and Recoverability: 4 Essential Elements
sponsored by EMC Corporation
WHITE PAPER: This white paper explores a disk-based backup solution with deduplication that provides the ultimate protection and assurance of recovery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Demonstrating Proven Business Value Through Backup Redesign with EMC: Not Enough Hours in the Day for Backup
sponsored by EMC
WHITE PAPER: This informative resource discusses how one organization easily and affordably implemented a backup solution that provides efficiency and resilience to conquer the challenges of today's IT landscape.
Posted: 18 Jul 2013 | Published: 30 Apr 2012

EMC
76 - 100 of 356 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement