IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
1 - 25 of 708 Matches Previous Page  | Next Page
How to Protect Unstructured Data
sponsored by Digital Guardian
WHITE PAPER: This white paper outlines a data protection model that is used to control unstructured data by identifying and applying policy-based controls over the data's lifecycle.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Three Steps to Securing Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

IHE and Intel®: Delivering a Foundation for Interoperable Health Information Exchange
sponsored by Intel® Services
WHITE PAPER: View this white paper to learn more about how you can solve your technological problems. With the IHE framework, you can create a process and model to help you address the challenges of efficient care coordination, disconnected data silos and non-scalable integration strategies.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Intel® Services

Staying Compliant and Secure in the Cloud Era
sponsored by CipherCloud
WEBCAST: This webcast reveals what it takes to stay compliant and protected in the age of the cloud.
Posted: 22 Sep 2014 | Premiered: Mar 10, 2014

CipherCloud

Seven Steps to Protecting Your Cloud Information
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

Symantec Backup Exec™ 2014 Data Sheet: Backup and Disaster Recovery
sponsored by Symantec Corporation
DATA SHEET: Access this data sheet to find out about a radically faster backup and recovery with innovative virtualization capabilities.
Posted: 22 Sep 2014 | Published: 31 May 2014

Symantec Corporation

Tackling Web Security Head On
sponsored by Cisco
WHITE PAPER: This white paper reveals a solution to tackle web security—blocking hidden malware and high-risk sites before it affects users.
Posted: 09 Sep 2014 | Published: 30 Sep 2013

Cisco

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA, The Security Division of EMC

Data Backup Types and Software Considerations
sponsored by EMC Corporation
EGUIDE: In this e-guide, learn from the experts at SearchDataBackup.com the different types of data backup including full, incremental, differential and incremental forever backup.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

EMC Corporation

Keep Up With the Evolving Threat Landscape to Protect Email
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.
Posted: 20 Aug 2014 | Published: 01 Jun 2013

Cisco Systems, Inc.

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

NS Security with CSO Online
sponsored by Citrix
WEBCAST: This webcast looks at threats to web applications and properties and gives tips on how organizations can secure web application properties.
Posted: 08 Aug 2014 | Premiered: Aug 8, 2014

Citrix

Store Less, Spend Less: Managing Data According to its Economic Value
sponsored by IBM
WHITE PAPER: Read on to learn about the tools, strategies and resources that can help you implement "information economics" approach within your organization.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

Why You Need Backup and Disaster Recovery
sponsored by N-able Technologies
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

N-able Technologies

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

Simple Steps to Prevent Data Theft
sponsored by HID
RESOURCE: This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Posted: 29 Jul 2014 | Published: 26 Jun 2014

HID

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to learn about the government's relationship with healthcare providers, and uncover insight for securing devices to protect sensitive data.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
1 - 25 of 708 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement