IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 675 Matches Previous Page  |  Next Page
From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Build Confidence in Your Resiliency Program Through Functional Validation
sponsored by IBM
WHITE PAPER: This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

Comparing Options for Office 365 Mobility Management
sponsored by Okta
WHITE PAPER: This white paper compares two leading Office 365 mobile security strategies and presents the pros and cons of both. Continue reading to learn what your mobile strategy needs to mitigate data loss.
Posted: 31 Aug 2015 | Published: 05 Aug 2015

Okta

Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015

Lookout

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

Healthcare Data Security in the Private Cloud
sponsored by BlueBox
WEBCAST: This brief webcast explores how one healthcare organization, BioIQ, configured their private cloud architecture to protect sensitive medical data. View now to learn how the private cloud can protect sensitive data at rest and more.
Posted: 28 Aug 2015 | Premiered: Jul 22, 2015

BlueBox

Vendor Lab Validation Report: Catalogic Copy Data Services
sponsored by Catalogic Software
WHITE PAPER: This report analyzes the Copy Data Services portion of Catalogic's overall Data Solution services and their instant virtualization and bare metal recovery of virtual servers. Access this white paper to view the highlights of this service.
Posted: 28 Aug 2015 | Published: 30 Sep 2014

Catalogic Software

Guide to Bimodal IT Strategy: Leveraging Traditional & Cloud-Based Apps
sponsored by Red Hat
WHITE PAPER: This e-book will instruct IT leaders on creating a bimodal infrastructure strategy that will enable you to support both traditional and new cloud-based agile IT applications. Read on to see how you can leverage the key benefits.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Red Hat

High Availability is not a Luxury: How to Eliminate Downtime
sponsored by arcserve
WHITE PAPER: It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

arcserve

Accelerate Application Performance with Cloud Bare Metal Configuration
sponsored by BlueBox
WHITE PAPER: This white paper discusses the typical database problems in the cloud, describes several use cases for bare metal database servers, and outlines a cloud server solution for each. Read on to access future guidelines for enhancing your cloud and bare metal servers.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

BlueBox

E-guide Exclusive: The Top 3 Tips for Selecting a DRaaS Provider
sponsored by Assuritive
EGUIDE: In this exclusive e-guide, expert Paul Kirvan shows you the pitfalls to avoid when considering DRaaS to support your mission-critical enterprise systems. Read on here to access the following guiding principles when choosing DRaaS.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Assuritive

Data Protection Systems and Practices
sponsored by Oracle Corporation
EGUIDE: This expert guide can help you make sure your sensitive data stays secure. In it, you'll find articles addressing some essential techniques and common questions regarding data protection.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Transforming Big Data Challenges into Prime Business Insights
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains how to take control of your data deluge, and turn it into an advantage to leverage insight for your enterprise. Read on to see how to achieve increased innovation and productivity.
Posted: 13 Aug 2015 | Published: 29 Jan 2015

Dell, Inc. and Intel®

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

Put Your Data First or Your Migration Will Come Last
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses how to be successful at data migrations in a world where most projects fail or significantly exceed their budgets. Read now to discover how a data migration factory approach could help your organization.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Oracle Corporation

Managed Backup: More Versatile Than Ever
sponsored by Solarwinds N-able
WHITE PAPER: Managed backup gives you the ability to recover your data lost from power outages, viruses, natural disasters, accidental deletions, and hardware failures. This white paper provides a way for you to seamlessly protect your customers' valuable data.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper makes a strong case for backup and disaster recovery and can help you to convince your clients (or your own company) that this is one of the best investments that a business can make.
Posted: 28 Jul 2015 | Published: 31 Jul 2014

Solarwinds N-able

Secure Your Printers and Eliminate Wasteful Costs
sponsored by Nuance
WEBCAST: This brief webcast explores how to reign in printing services in the organization to protect enterprise data. View now to discover how to stop data leaks before they happen and how to eliminate help desk tickets.
Posted: 27 Jul 2015 | Premiered: Feb 13, 2015

Nuance

DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance DLP solutions and gives advice on the most strategic ways to implement these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

When Disaster Strikes, Will Your BC/DR Plans Be Ready?
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores 4 critical disaster recovery assessments for your organization's cloud-based data and applications.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.
1 - 25 of 675 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement