IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 670 Matches Previous Page  |  Next Page
Healthcare Data Security in the Private Cloud
sponsored by BlueBox
WEBCAST: This brief webcast explores how one healthcare organization, BioIQ, configured their private cloud architecture to protect sensitive medical data. View now to learn how the private cloud can protect sensitive data at rest and more.
Posted: 28 Aug 2015 | Premiered: Jul 22, 2015

BlueBox

Vendor Lab Validation Report: Catalogic Copy Data Services
sponsored by Catalogic Software
WHITE PAPER: This report analyzes the Copy Data Services portion of Catalogic's overall Data Solution services and their instant virtualization and bare metal recovery of virtual servers. Access this white paper to view the highlights of this service.
Posted: 28 Aug 2015 | Published: 30 Sep 2014

Catalogic Software

Guide to Bimodal IT Strategy: Leveraging Traditional & Cloud-Based Apps
sponsored by Red Hat
WHITE PAPER: This e-book will instruct IT leaders on creating a bimodal infrastructure strategy that will enable you to support both traditional and new cloud-based agile IT applications. Read on to see how you can leverage the key benefits.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Red Hat

High Availability is not a Luxury: How to Eliminate Downtime
sponsored by arcserve
WHITE PAPER: It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

arcserve

Accelerate Application Performance with Cloud Bare Metal Configuration
sponsored by BlueBox
WHITE PAPER: This white paper discusses the typical database problems in the cloud, describes several use cases for bare metal database servers, and outlines a cloud server solution for each. Read on to access future guidelines for enhancing your cloud and bare metal servers.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

BlueBox

E-guide Exclusive: The Top 3 Tips for Selecting a DRaaS Provider
sponsored by Assuritive
EGUIDE: In this exclusive e-guide, expert Paul Kirvan shows you the pitfalls to avoid when considering DRaaS to support your mission-critical enterprise systems. Read on here to access the following guiding principles when choosing DRaaS.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Assuritive

Data Protection Systems and Practices
sponsored by Oracle Corporation
EGUIDE: This expert guide can help you make sure your sensitive data stays secure. In it, you'll find articles addressing some essential techniques and common questions regarding data protection.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Transforming Big Data Challenges into Prime Business Insights
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains how to take control of your data deluge, and turn it into an advantage to leverage insight for your enterprise. Read on to see how to achieve increased innovation and productivity.
Posted: 13 Aug 2015 | Published: 29 Jan 2015

Dell, Inc. and Intel®

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

Put Your Data First or Your Migration Will Come Last
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses how to be successful at data migrations in a world where most projects fail or significantly exceed their budgets. Read now to discover how a data migration factory approach could help your organization.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Oracle Corporation

Managed Backup: More Versatile Than Ever
sponsored by Solarwinds N-able
WHITE PAPER: Managed backup gives you the ability to recover your data lost from power outages, viruses, natural disasters, accidental deletions, and hardware failures. This white paper provides a way for you to seamlessly protect your customers' valuable data.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper makes a strong case for backup and disaster recovery and can help you to convince your clients (or your own company) that this is one of the best investments that a business can make.
Posted: 28 Jul 2015 | Published: 31 Jul 2014

Solarwinds N-able

Secure Your Printers and Eliminate Wasteful Costs
sponsored by Nuance
WEBCAST: This brief webcast explores how to reign in printing services in the organization to protect enterprise data. View now to discover how to stop data leaks before they happen and how to eliminate help desk tickets.
Posted: 27 Jul 2015 | Premiered: Feb 13, 2015

Nuance

DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance and data loss prevention (DLP) solutions, and it gives advice for being smart when implementing these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

When Disaster Strikes, Will Your BC/DR Plans Be Ready?
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores 4 critical disaster recovery assessments for your organization's cloud-based data and applications.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

The Security Challenges of Digital Collaboration
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.
1 - 25 of 670 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement