IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
126 - 150 of 789 Matches Previous Page  |  Next Page
Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper gives you tips on how to protect your sensitive data and what to look out for in today's dynamic threat landscape. Access now and learn how to foster an environment of diligence among your employees so they can protect your enterprise from catastrophe.
Posted: 10 Mar 2016 | Published: 08 Jul 2015

Absolute

Breaking Bad: The Risk of UnsecureFile Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.
Posted: 09 Mar 2016 | Published: 31 Oct 2014

IntraLinks, Inc

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: This white paper sheds light on how hostile the PHI black market is with recent breach reports. Learn from other healthcare organizations that have experienced a data breach and make security adjustments to ensure you don't suffer the same fate.
Posted: 09 Mar 2016 | Published: 31 Dec 2015

Absolute

IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise
sponsored by IBM
WHITE PAPER: This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

IBM

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Oracle Backup and Recovery Strategies: Moving to Data-Protection-as-a-Service
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper reviews best practices for data protection approaches for backup up Oracle databases. Read on to discover how you can effectively protect your data and provide greater granularity on an application-by-application bases while reducing your RPO and RTO.
Posted: 24 Feb 2016 | Published: 22 Oct 2015

Oracle, in association with Intel

Open Source Security Needed in Development
sponsored by Black Duck Software
WHITE PAPER: With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.
Posted: 24 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 24 Feb 2016 | Published: 15 Dec 2015

Imperva

Secure and Manage Open Source Software
sponsored by Black Duck Software
WHITE PAPER: This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Think You Have Application Security Covered? Think again.
sponsored by Black Duck Software
WHITE PAPER: Access this white paper and learn about some of the complications developers have when dealing with open source application development.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Know Your Open Source Code Security is Enhanced by Better Visibility into Code Acquired from Multiple Sources
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you the benefits and shortcomings of open source code and how to deal with any problems you might face when developing with it.
Posted: 16 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you how to utilize open source code without accruing potential risks involved in it.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Gartner: Magic Quadrant for Enterprise Data Loss
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses today's DLP market and what your DLP architecture should look like. Read more to learn about the two categories from DLP: Enterprise DLP and Integrated DLP.
Posted: 15 Feb 2016 | Published: 28 Jan 2016

Digital Guardian

Application Security in 2016: A Comprehensive Overview
sponsored by Black Duck Software
WHITE PAPER: In this white paper, you will read about key open source application security challenges that your business will face in 2016. Learn how CISO's can address and manage those challenges effectively.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015

Imperva

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Next-Generation Endpoint Security for Dummies
sponsored by Carbon Black
EBOOK: This e-book explains how all organizations are targeted in today's advanced threat environment. Discover how endpoints can serve as vulnerabilities to adversaries seeking to exploit your enterprise.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Carbon Black

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

Understanding Cloud Security: The AWS Shared Responsibility Model
sponsored by Alert Logic
RESOURCE: This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.
Posted: 22 Feb 2016 | Published: 27 Jan 2016

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera
126 - 150 of 789 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement