IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
101 - 125 of 787 Matches Previous Page  |  Next Page
Develop a strong IAM strategy for third-party vendors
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.
Posted: 12 Apr 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Operationalizing Data Governance with Living Metadata
sponsored by ERwin
WHITE PAPER: This white paper teaches you the importance of updating and reviewing your organization's metadata regularly. Explore best practices in maintaining "living" metadata platforms.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Top 10 Reasons to Select CA ERwin® Modeling
sponsored by ERwin
WHITE PAPER: This white paper shows you 10 reasons why you should use a data model to manage your multiple data sources.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Buyer’s Guide to Enterprise Collaboration Solutions
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper will help you collaborate with potential security providers and vendors when performing due diligence in choosing your right solution. Access now to learn how you can get end-to-end visibility as your data travels through complex networks.
Posted: 06 Apr 2016 | Published: 31 Dec 2014

IntraLinks, Inc

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

Realize the value of data protection at scale
sponsored by HGST
WHITE PAPER: In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

Protect Your Computer Screen With OptioLabs' OptioAware
sponsored by OptioLabs
VIDEO: In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.
Posted: 30 Mar 2016 | Premiered: 15 Dec 2015

OptioLabs

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction
sponsored by OptioLabs
VIDEO: This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.
Posted: 29 Mar 2016 | Premiered: 10 Mar 2016

OptioLabs

Case Study: Financial Services Firm Implements Cloud DRaaS
sponsored by Cirrity
WHITE PAPER: This case study highlights how one financial services firm was able to prevent loss of revenue after a disaster occurred by implementing a cloud disaster recovery as a service (DRaaS) solution. Read on and discover how this DRaaS platform can enable a safer and more scalable data storage system and complete disaster recovery solution.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

Cirrity

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Demo of OptioAware by OptioLabs
sponsored by OptioLabs
VIDEO: View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.
Posted: 25 Mar 2016 | Premiered: 21 Dec 2015

OptioLabs

Today's Most Valuable Commodity is Located in Cyberspace
sponsored by Digital Guardian
EGUIDE: This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Data Governance: The True Key to Effective Risk Management
sponsored by Guidance Software, Inc.
EGUIDE: In this eguide, you will learn the real importance of information governance. It's much more than keeping track of digital records for compliance reasons. Discover how to build classification tools and functional descriptive data into our digital assets so they can be accessed for business with increased efficiency.
Posted: 22 Mar 2016 | Published: 18 Mar 2016

Guidance Software, Inc.

Demo: Oracle Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
VIDEO: This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.
Posted: 21 Mar 2016 | Premiered: 04 Aug 2015

Oracle, in association with Intel

Oracle's Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.
Posted: 21 Mar 2016 | Published: 31 Dec 2015

Oracle, in association with Intel

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

An IT Pro’s Guide to Protecting Virtualized Data
sponsored by arcserve
WEBCAST: Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.
Posted: 17 Mar 2016 | Premiered: Nov 30, 2015

arcserve

A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute
WHITE PAPER: This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 14 Mar 2016 | Published: 13 Nov 2014

Absolute

2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)
sponsored by IBM
TECHNICAL ARTICLE: This article teaches you about next-generation IPSs which offer the best protection and response to advanced threats on endpoints and in the cloud.
Posted: 11 Mar 2016 | Published: 16 Nov 2015

IBM

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper gives you tips on how to protect your sensitive data and what to look out for in today's dynamic threat landscape. Access now and learn how to foster an environment of diligence among your employees so they can protect your enterprise from catastrophe.
Posted: 10 Mar 2016 | Published: 08 Jul 2015

Absolute

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.
101 - 125 of 787 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement