IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 664 Matches Previous Page  |  Next Page
Disaster Recovery Guide: DR in Virtualized Environments
sponsored by Macquarie Cloud Services
WHITE PAPER: Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Macquarie Cloud Services

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Pulse, January 2017, Volume 5, Number 1
sponsored by SearchHealthIT.com
EZINE: Acess now to, gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. Also in this issue of Pulse Magazine, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Solving the DLP Puzzle: Learnings for a Successful Deployment
sponsored by Intel Security
PODCAST: What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Commvault

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Getting a Grip on Content: Empowered Content Collaboration in the Cloud
sponsored by IBM
RESOURCE: Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.
Posted: 19 Oct 2016 | Published: 31 Dec 2015

IBM

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van
sponsored by Ambra
CASE STUDY: Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Case Study: Disc Comfort Fuses Image Management with athenahealth
sponsored by Ambra
CASE STUDY: Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

Case Study: CareWell Streamlines Patient Journey & Reduces Risk
sponsored by Ambra
CASE STUDY: Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

The New World of Unified Image Management in Healthcare
sponsored by Ambra
EBOOK: In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Ambra

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Hitachi Data Systems and Veritas: Joint Brochure
sponsored by HDS and Veritas
WHITE PAPER: Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.
Posted: 11 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC
1 - 25 of 664 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement