IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 668 Matches Previous Page  |  Next Page
Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Pulse, January 2017, Volume 5, Number 1
sponsored by SearchHealthIT.com
EZINE: Acess now to, gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. Also in this issue of Pulse Magazine, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

Solving the DLP Puzzle: Learnings for a Successful Deployment
sponsored by Intel Security
PODCAST: What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Commvault

IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy
sponsored by SAS
WHITE PAPER: Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

SAS

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Getting a Grip on Content: Empowered Content Collaboration in the Cloud
sponsored by IBM
RESOURCE: Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.
Posted: 19 Oct 2016 | Published: 31 Dec 2015

IBM

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van
sponsored by Ambra
CASE STUDY: Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Case Study: Disc Comfort Fuses Image Management with athenahealth
sponsored by Ambra
CASE STUDY: Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Hitachi Data Systems and Veritas: Joint Brochure
sponsored by HDS and Veritas
WHITE PAPER: Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.
Posted: 11 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas
1 - 25 of 668 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement