IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 696 Matches Previous Page  |  Next Page
Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER: This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015


Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015


Methods for Secure, Large File Transfers
sponsored by Axway
EGUIDE: Learn four key steps to keeping your network secure when big files exit your enterprise and low-cost options for secure,large file transfers in the enterprise in this exclusive, expert resource. Continue reading and discover how to make data exfiltration harder for hacker.
Posted: 13 Nov 2015 | Published: 05 Nov 2015


Mac OS X Security Checklist
sponsored by JAMF Software
WHITE PAPER: This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.
Posted: 11 Nov 2015 | Published: 29 Oct 2015

JAMF Software

Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Data Archiving for Financial Services
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.
Posted: 09 Nov 2015 | Premiered: Dec 31, 2014

Proofpoint, Inc.

2015 Cost of Data Breach Study: India
sponsored by IBM
WHITE PAPER: Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Case Study: Web Host and Domain Registrar Ensures Room for Growth
sponsored by Nimble Storage
WHITE PAPER: In this white paper, learn how one company overcame its inability to effectively scale its storage capacity with business growth, and eliminate their data recovery issues. See the capabilities of the flash storage option they chose, including rapid insight into storage management, capacity, and trends, reduced data center footprint, and more.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Nimble Storage

How Cloud Computing Transforms New Business Models
sponsored by OpenText
WHITE PAPER: Cloud services now include management of deployment, apps, platforms, and IT infrastructure. In this white paper, you will learn the 6 most important considerations to keep in mind for a successful cloud partnership with your provider.
Posted: 29 Oct 2015 | Published: 31 Dec 2014


Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.
Posted: 27 Oct 2015 | Published: 31 Aug 2015

FujiFilm Dternity

10 Ways Data Preparation Can Assist Excel Data Analytics
sponsored by Datawatch Corporation
WHITE PAPER: In this white paper, you will learn how to enrich, blend, and combine disparate data sets with a self-service data preparation solution for Excel. Access this paper now to key into the 10 most effective ways data preparation can assist your Excel-run data analytics.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Datawatch Corporation

Optimizing Your Enterprise Data Warehouse with Hadoop
sponsored by Hortonworks
WHITE PAPER: This white paper examines the challenges with enterprise data warehouses (EDW), and explains how Hadoop can effectively optimize your EDW. Learn how you can archive data to Hadoop and away from EDW, offload costly ETL processes to Hadoop, and more.
Posted: 26 Oct 2015 | Published: 31 Mar 2015


Building Governance Into Big Data: A Meta-Data Based Approach
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a new approach to data management, in which governance is weaved into your modern data architecture using a meta-data service. Learn why metadata and taxonomy hold the key to comprehensive data governance, as well as key into the 4 essential elements of Hadoop governance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Bolster Your DLP Systems for Safer File Sharing and Collaboration
sponsored by FinalCode
EGUIDE: In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014

Proofpoint, Inc.

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper compares the two primary focuses of data protection – data-at-rest and data-in-motion – and analyzes which one is most effective.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Identity Finder, LLC

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Increase Productivity and Reduce Risk with Secure File Sharing & Collaboration
sponsored by BlackBerry
WHITE PAPER: This white paper highlights an EFSS solution that allows you to take control over your data, combining the benefits of productivity and collaboration with security. Bolster your business against third-party threats with 6 steps for deploying secure EFSS.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
1 - 25 of 696 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement