IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 674 Matches Previous Page  |  Next Page
Cloud Data Management Gains Ground in the Digital Era
sponsored by Commvault
WHITE PAPER: In this exclusive white paper, you will discover how to leverage your cloud investments with single-vendor solutions, as well as how to manage efficiencies using a single-software cloud platform. Access this review now to simplify your data management, reduce security risk, and unlock value from cloud-managed data.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Commvault

Protecting Your Data in Microsoft Office 365
sponsored by Elastica
WHITE PAPER: This white paper explains why Office 365 increases the risk of malicious or accidental mission-critical data leakage.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Elastica

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Using The Cloud to Improve Business Resilience
sponsored by IBM
WHITE PAPER: This white paper discusses what cloud computing can do to improve your organization's availability and resiliency operations, and how to choose a third-party provider for managed cloud services. Access this report now to find out why cloud resilience is so effective, and more.
Posted: 04 Sep 2015 | Published: 30 Sep 2014

IBM

7 Essential Business Continuity Management Practices
sponsored by IBM
WHITE PAPER: This white paper examines a tested approach for successfully evolving business continuity into an organization-wide, integrated program. Read on now to access the 7 essential BCM practices to improve consistency across your business units.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Upgrade Your BCM with a New Business-Centric Approach
sponsored by IBM
WHITE PAPER: This white paper details IBM's innovative approach to business continuity management (BCM) and uses their experiences as case studies. Read on to get guidance on how you can apply IBM's approach to your organization and proceed to the next level in continuity management.
Posted: 04 Sep 2015 | Published: 30 Apr 2015

IBM

The Big Bang: The Cloud's Role in Expanding the Universe of Digital Data
sponsored by IBM
WHITE PAPER: This exclusive report by Forbes examines what the cloud can do for you when it comes to disaster recovery, security, and compliance. Access this report to how your organization can grow and thrive in the expanding data universe, bolstered by cloud-enabled disaster planning and data management.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

IBM

Cloud-to-Cloud Backup: Protecting Data from Malicious Intent
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores the data backup and recovery shortcomings of Office 365 and the steps to take to protect data against accidental or malicious loss.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Barracuda Networks

A VDI Infrastructure Case Study: Nottinghamshire Health Informatics Service
sponsored by Pivot3
WHITE PAPER: This case study highlights how Nottinghamshire Health Informatics Service improved their flexibility and performance by updating their VDI infrastructure with Pivot3 vSTAC appliances. Access this white paper now to increase the efficiency of the IT department in your healthcare institution and maximum ROI for the IT infrastructure.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Pivot3

SEA-TAC Airport Enterprise Storage Strategy Fosters Sustainability
sponsored by Pivot3
WHITE PAPER: This case study demonstrates how the Seattle-Tacoma International Airport developed a plan to deploy a centralized security management system. Read on here to deliver enterprise-class video surveillance IT infrastructure in a simple-to-deploy and scale-out appliance model.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Pivot3

Are You Getting the Most from Your Hybrid IT Environment?
sponsored by IBM
WHITE PAPER: This white paper demonstrates how to find the right sourcing provider for your organization, and highlights several areas in which providers should be effective in hybrid environments.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Server Management: Imrpove Availability and Reduce Costs
sponsored by IBM
WHITE PAPER: In this white paper, you'll learn a 10 step process to simplifying server monitoring and management.
Posted: 01 Sep 2015 | Published: 16 Apr 2014

IBM

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014

IBM

Big Data Needs Big Storage: Deciding on an Optimal Storage Platform
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 important requirements to consider when deciding on the right storage platform for your big data needs. Read on to find out how the following can impact your enterprise's analytics.
Posted: 01 Sep 2015 | Published: 31 Mar 2015

IBM

Vendor Blueprint for Virtualized Data Protection: Extending to Hyper-V Environments
sponsored by IBM
WHITE PAPER: This ESG Lab Review documents the testing of one data protection solution for virtual environments, with a particular focus on ease of use, flexibility, and architecture efficiency. Access this white paper to protect your VMware and Windows Hyper-V environments.
Posted: 01 Sep 2015 | Published: 31 Jul 2015

IBM

Data Breach Readiness 2.0
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

ComputerWeekly.com

From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Build Confidence in Your Resiliency Program Through Functional Validation
sponsored by IBM
WHITE PAPER: This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015

Lookout

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

Vendor Lab Validation Report: Catalogic Copy Data Services
sponsored by Catalogic Software
WHITE PAPER: This report analyzes the Copy Data Services portion of Catalogic's overall Data Solution services and their instant virtualization and bare metal recovery of virtual servers. Access this white paper to view the highlights of this service.
Posted: 28 Aug 2015 | Published: 30 Sep 2014

Catalogic Software

Guide to Bimodal IT Strategy: Leveraging Traditional & Cloud-Based Apps
sponsored by Red Hat
WHITE PAPER: This e-book will instruct IT leaders on creating a bimodal infrastructure strategy that will enable you to support both traditional and new cloud-based agile IT applications. Read on to see how you can leverage the key benefits.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Red Hat

High Availability is not a Luxury: How to Eliminate Downtime
sponsored by arcserve
WHITE PAPER: It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

arcserve
1 - 25 of 674 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement