IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 684 Matches Previous Page  |  Next Page
Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER: This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015


Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015


Mac OS X Security Checklist
sponsored by JAMF Software
WHITE PAPER: This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.
Posted: 11 Nov 2015 | Published: 29 Oct 2015

JAMF Software

Data Archiving for Financial Services
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.
Posted: 09 Nov 2015 | Premiered: Dec 31, 2014

Proofpoint, Inc.

2015 Cost of Data Breach Study: India
sponsored by IBM
WHITE PAPER: Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Case Study: Web Host and Domain Registrar Ensures Room for Growth
sponsored by Nimble Storage
WHITE PAPER: In this white paper, learn how one company overcame its inability to effectively scale its storage capacity with business growth, and eliminate their data recovery issues. See the capabilities of the flash storage option they chose, including rapid insight into storage management, capacity, and trends, reduced data center footprint, and more.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Nimble Storage

How Cloud Computing Transforms New Business Models
sponsored by OpenText
WHITE PAPER: Cloud services now include management of deployment, apps, platforms, and IT infrastructure. In this white paper, you will learn the 6 most important considerations to keep in mind for a successful cloud partnership with your provider.
Posted: 29 Oct 2015 | Published: 31 Dec 2014


Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.
Posted: 27 Oct 2015 | Published: 31 Aug 2015

FujiFilm Dternity

10 Ways Data Preparation Can Assist Excel Data Analytics
sponsored by Datawatch Corporation
WHITE PAPER: In this white paper, you will learn how to enrich, blend, and combine disparate data sets with a self-service data preparation solution for Excel. Access this paper now to key into the 10 most effective ways data preparation can assist your Excel-run data analytics.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Datawatch Corporation

Optimizing Your Enterprise Data Warehouse with Hadoop
sponsored by Hortonworks
WHITE PAPER: This white paper examines the challenges with enterprise data warehouses (EDW), and explains how Hadoop can effectively optimize your EDW. Learn how you can archive data to Hadoop and away from EDW, offload costly ETL processes to Hadoop, and more.
Posted: 26 Oct 2015 | Published: 31 Mar 2015


Building Governance Into Big Data: A Meta-Data Based Approach
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a new approach to data management, in which governance is weaved into your modern data architecture using a meta-data service. Learn why metadata and taxonomy hold the key to comprehensive data governance, as well as key into the 4 essential elements of Hadoop governance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Bolster Your DLP Systems for Safer File Sharing and Collaboration
sponsored by FinalCode
EGUIDE: In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014

Proofpoint, Inc.

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper compares the two primary focuses of data protection – data-at-rest and data-in-motion – and analyzes which one is most effective.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Identity Finder, LLC

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Case Study: Securing PCI Data in a Decentralized Network
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper discusses the issues surrounding PCI security and compliance and presents an in-depth case study of a hotel that overcame these challenges.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Case Study: Protecting PHI without Slowing Patient Care
sponsored by Identity Finder, LLC
WHITE PAPER: This paper describes the challenges of managing PHI and presents an in-depth case study of a healthcare organization that overcame these challenges.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


DLP Benefits for Enterprises and Intellectual Property Protection
sponsored by Digital Guardian
EGUIDE: This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

Digital Guardian

Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
1 - 25 of 684 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement