IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 642 Matches Previous Page  |  Next Page
Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Allgress for the Healthcare Industry
sponsored by Allgress
WHITE PAPER: In this white paper, explore a risk management tools suite that reduces complexity and provides seamless oversight of the risk, security, and compliance management life-cycle.
Posted: 23 Jan 2015 | Published: 07 Jan 2015

Allgress

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Get the Upper Hand on Virtual Machine Sprawl
sponsored by SearchServerVirtualization
EBOOK: As hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

SearchServerVirtualization

EMC Global Data Protection Index: Global Key Results & Findings
sponsored by EMC Corporation
WHITE PAPER: This informative resource presents the results of a recent survey on trends in enterprise data protection, which collected data from 3,300 IT leaders across 24 countries.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

EMC Corporation

SQL Server 2014 – Big Benefits for Analytics: Part 1
sponsored by Insight
WEBCAST: Dive deep into what a real end user needs for business analytics success and find out how SQL Server 2014 can help.
Posted: 05 Jan 2015 | Premiered: Dec 19, 2014

Insight

How BlackBerry Addresses BYOD Security Issues
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Leveraging Cloud Storage Tech for Next Gen File Services
sponsored by CTERA Networks
WHITE PAPER: Access this whitepaper to find out how cloud storage improves protection by providing external backup and disaster recovery to prevent data loss.
Posted: 04 Dec 2014 | Published: 31 Jul 2014

CTERA Networks

Extend Your Security Strategy into the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Why the Centralization of Content is Critical to Cloud Security
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Facilitating a Smooth, Problem-Free Migration to Converged Infrastructure
sponsored by Bull
WHITE PAPER: In this whitepaper, tech expert Lisa Kelly examines the business benefits of moving to CI and assesses the potential risks to data and apps IT may run into during migration.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Bull

7 Common Cloud DLP Mistakes & How to Avoid Them
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper covers seven key mistakes you must avoid when taking your data loss prevention methods to the cloud.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

SkyHigh

One Size Never Fits All: Optimizing your Organization with Backup Built for Your Business
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines why the "one-size-fits-all" may not be the best approach for data backup and how it can potentially cause IT departments to over-pay or under-protect. You'll also learn about a data protection platform that provides uniquely tailored tools for physical, virtual and cloud workloads across almost any OS environment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

CipherCloud Adds AES 256-BIT Encryption to Box Product, Expands Abroad
sponsored by CipherCloud
EGUIDE: San Jose, Calif.-based cloud computing vendor CipherCloud Inc. has announced the addition of AES 256-bit encryption to its data loss prevention (DLP) offering for Box, the popular cloud storage and collaboration provider.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

CipherCloud

Protecting Mission-Critical Application Environments
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper discusses mission-critical application backup and recovery, proposing a shift to a more intelligent and adaptive backup and recovery framework that incorporates application awareness, storage integration, and operational analytics.
Posted: 24 Oct 2014 | Published: 26 Sep 2014

Hewlett-Packard Limited

Forrester Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
sponsored by Absolute Software
WHITE PAPER: The following white paper discusses the current state of endpoint data loss in healthcare organizations using the current breach data to highlight the need for a data-centric approach to endpoint security on all employee devices. In addition, this paper intends to illustrate an approach that can lead to fewer compliance violations and reduced risk.
Posted: 21 Oct 2014 | Published: 04 Sep 2014

Absolute Software

IBM System x Reliability Solution for Stratus everRun Enterprise Reference Architecture
sponsored by Lenovo and Intel
WHITE PAPER: This reference architecture document discusses the software components, design philosophy, and bill of material for the new System x Reliability Solution for Stratus everRun Enterprise, which combines industry-leading downtime prevention software from Stratus with resilient IBM System x servers, powered by the latest Intel® Xeon® processors.
Posted: 20 Oct 2014 | Published: 01 Jan 2014

Lenovo and Intel

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com
1 - 25 of 642 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement