IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
126 - 150 of 696 Matches Previous Page  | Next Page
Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

Iron Mountain

How Snapshot and CDP Integrate with Data Backup
sponsored by SearchStorage.com
ESSENTIAL GUIDE: This Handbook explores why one expert believes replication, CDP and snapshots are keys to a successful data backup strategy; how virtualization gives CDP a big boost; and the many types of snapshots available today.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

SearchStorage.com

Vendor Landscape: Disk Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This informative paper explores the top ten players in today's disk backup marketplace. Find out how it got to where it is, see where it's headed in the future and discover which vendor's solution rises above the rest.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

ExaGrid Systems, Inc.

Unchain your network with application intelligence and control
sponsored by Dell Software
WHITE PAPER: This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
EBOOK: Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Hitachi High-Performance Storage Reins in File-Based Data and Application Growth
sponsored by Hitachi Data Systems
PRODUCT OVERVIEW: Check out this informative resource to explore a NAS storage solution to handle the massive and growing amount of file-based data in today's environments. Read on to learn how this technology can help you improve storage efficiencies, optimize virtual server environments, provide high performance and scalability and much more.
Posted: 05 Sep 2013 | Published: 31 Jul 2013

Hitachi Data Systems

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Building higher IT business continuity in the face of disaster
sponsored by Dell Software
WHITE PAPER: In the past, one- or two-day outages were cause for concern. Today, an outage of a few hours can cripple your organization. It's not just your employees who are affected; partners and customers also link to your IT operation through email and database applications. Make sure you're up to date on operational continuity: Read the White Paper
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Dell Software

Protecting applications and data in a virtual world with AppAssure
sponsored by Dell Software
WHITE PAPER: Data protection in a virtual environment often requires strategies and tools different from those utilized in a physical infrastructure. Dell AppAssure provides holistic data protection for both physical and virtual environments, dramatically improving recovery time and recovery point objectives. Read the Brief
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Dell Software

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

ComputerWeekly.com

Dell Data Protection Point of View
sponsored by Dell Software
WHITE PAPER: When a system fails, IT is on the hook to restore data and applications immediately. However, statistics show it takes an average of 18.5 hours to recover data after an outage, and 50 percent of restores end in a loss of critical information. With downtime costs running approximately $5,600 per minute, the stakes are high. Read the White Paper
Posted: 03 Sep 2013 | Published: 31 May 2013

Dell Software

Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service
sponsored by Citrix Ready and Caringo
WEBCAST: In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.
Posted: 30 Aug 2013 | Premiered: Sep 12, 2013


Ten Smart Things to Know About Storage
sponsored by Sirius Computer Solutions
WHITE PAPER: Check out this informative paper to explore ten crucial things to know about today's storage and how it can affect your business. Read on to explore topics such as storage scaling, thin provisioning, backup and deduplication and much more.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

Sirius Computer Solutions

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013

IBM.

Modernize your data platform with HP Storage and Microsoft SQL Server 2012
sponsored by AdvizeX Technologies
BROCHURE: This resource explores an ideal storage foundation for today's virtualized environments that delivers flexibility, efficiency and a great deal of uptime.
Posted: 26 Aug 2013 | Published: 31 Oct 2012

AdvizeX Technologies

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Demystifying Deduplication for Backup with the Dell DR4000
sponsored by Dell Software
WHITE PAPER: A disruption in the availability of data can break business continuity. Any good impact analysis must consider how quickly data access can be restored and how recent the data must be. Tape backup is no longer effective for all scenarios, and disk-based backup presents challenges as well. Is data deduplication the answer? Read the White Paper
Posted: 23 Aug 2013 | Published: 31 Jan 2012

Dell Software

ESG Lab Validation Report: Dell PowerVaultDL4000 Appliance
sponsored by Dell Software
WHITE PAPER: IT teams today are faced with swelling data volumes and expanding virtualization, both of which complicate the protection landscape and challenge your staff's resources. The DL4000 protects both physical and virtual servers, nearly eliminating backup windows and providing recovery assurance for data and applications. Read the Report
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Expert Steps for Meeting VM Storage and Backup Requirements
sponsored by EMC Corporation
EGUIDE: This e-guide examines how storage fits into the virtualization equation and points out the unique challenges associated with backing up virtual machines.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

EMC Corporation

Top 3 Considerations When Building Business Continuity and Disaster Recovery Service Offerings
sponsored by CA Technologies.
WHITE PAPER: Check out this white paper to explore the top three things to consider whilst building your business continuity and disaster recovery strategies.
Posted: 08 Aug 2013 | Published: 30 Apr 2012

CA Technologies.

Cloud Backup and Recovery: Customer Spending Trends and Purchasing Intentions
sponsored by Intronis
EGUIDE: This e-guide outlines four critical risk management strategies MSPs can implement to protect their business and clients and strengthen their position in the competitive cloud market.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Intronis

Cloud Data Protection: Selling Benefits and Overcoming Adoption Barriers
sponsored by Intronis
EGUIDE: This e-guide recaps the benefits of and barriers to cloud data protection services and elaborates on the concept behind hybrid cloud DR.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Intronis
126 - 150 of 696 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement