IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 746 Matches Previous Page  |  Next Page
Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

CW Nordics August 2016
sponsored by ComputerWeekly.com
EBOOK: The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.
Posted: 09 Aug 2016 | Published: 10 Aug 2016

ComputerWeekly.com

Backupify for Office 365: Return of the Data
sponsored by Datto, Inc.
EBOOK: This e-book highlights a secure backup and recovery solution for Office 365. Discover how you can enable automatic backups and capacity planning with a backup solution that includes features such as built-in data encryption, export capabilities, compliance controls, and more.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Datto, Inc.

Streamlining Data Backup: Recovery Manager Central ChalkTalk
sponsored by NTT ICT
VIDEO: How can you streamline backup and recovery for an efficient use of resources? Tune into this video to leverage centralized recovery with a converged data protection solution—combining the accelerated performance of snapshots with the dedicated protection of backup.
Posted: 08 Aug 2016 | Premiered: 07 Jun 2016

NTT ICT

Data Protection. No Limits.
sponsored by NTT ICT
VIDEO: This video highlights how Marriott Resorts, Mansfield Oil, and Shields Healthcare boosted the speed at which they backup and recover sensitive data with "no limits" data protection. Tune in to discover a data backup platform that performs seamlessly across all industries.
Posted: 08 Aug 2016 | Premiered: 08 Aug 2016

NTT ICT

"Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs
sponsored by NTT ICT
VIDEO: If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.
Posted: 05 Aug 2016 | Premiered: 30 May 2016

NTT ICT

Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016

NTT ICT

Secure Your Growing Data with Disk-Based Backup and Recovery
sponsored by NTT ICT
VIDEO: Discover how to keep pace with rapid data growth while reducing cost and capacity requirements by leveraging disk-based backup architecture. Tune into this video to take advantage of rapid recovery and app integration, as well as software-defined data protection that removes the need for in-store dedicated backup at ROBOs.
Posted: 03 Aug 2016 | Premiered: 29 Apr 2016

NTT ICT

Infographic: EMC Global Data Protection Index
sponsored by Richardson Eyres
RESOURCE: EMC's global data protection index highlights the maturity of data protection approaches around the world. Discover how enterprises are faring in regards to data loss prevention and disaster recovery, and see how leaders are staying ahead of the curve when it comes to their data protection approach with cloud computing.
Posted: 01 Aug 2016 | Published: 31 Dec 2015

Richardson Eyres

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Privileged Users
sponsored by Forcepoint
WHITE PAPER: Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Global Data Protection Index Highlights
sponsored by EMC
VIDEO: EMC's Global Data Protection Index of 2016 revealed that most businesses are still unprepared for new, emerging threats. Discover the outlook of data protection strategies around the world, and learn how to prepare for the rapidly changing landscape of threats to enterprise data.
Posted: 30 Jun 2016 | Premiered: 28 Jun 2016

EMC

Are You Protected? Get Ahead of the Curve
sponsored by EMC
PRESENTATION: Explore the global readiness of enterprises in terms of their data protection, backup, and recovery solutions. Access this presentation to learn more and take advantage of valuable recommendations for modernizing your data management and protection strategies.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

EMC

Global Data Protection Index
sponsored by EMC
RESOURCE: Explore the readiness of companies around the world for data protection challenges brought on by cloud, big data, and mobile devices. By modernizing your data protection solutions, you can modernize your business, and achieve efficient backup and recovery. View this infographic now to learn more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

EMC
1 - 25 of 746 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement