IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
151 - 175 of 651 Matches Previous Page  | Next Page
Chalk Talk Video Series (3): Ensuring Data Protection with VMware
sponsored by VMware, Inc.
VIDEO: Check out this short video to explore a backup solution that was specifically built to protect virtual environments.
Posted: 16 Jul 2013 | Premiered: 16 Jul 2013

VMware, Inc.

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

What Sets File Sync and Share Apart from Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

IBM Power Systems and Their Support for Business Resilience in Challenging IT Environments
sponsored by IBM
WHITE PAPER: This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
Posted: 26 Jun 2013 | Published: 30 Apr 2012

IBM

Security Think Tank: Bring your own device
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST: In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013

Oracle Corporation

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Expanding Web Single Sign-On to Cloud and Mobile
sponsored by CA Technologies.
WHITE PAPER: This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience.
Posted: 11 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by More Direct
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

More Direct

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013

BlackBerry

Top 10 BYOD Pitfalls to Avoid
sponsored by BlackBerry
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

BlackBerry

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

Backup Software: Recent Developments and Vendor Rankings
sponsored by CommVault Systems, Inc.
EGUIDE: This E-Guide evaluates the top enterprise and midrange backup applications in the marketplace and rates them across five key categories
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

Compliance Considerations for Backup and Recovery
sponsored by CommVault Systems, Inc.
EGUIDE: This e-guide underscores the importance of physical security policies and proper account usage and explains how they can prevent theft and potential data breaches.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

Rethink Defense-In-Depth Security Model For BYOD
sponsored by McAfee, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

McAfee, Inc.

Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Data Systems
EBOOK: This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Hitachi Data Systems

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems

Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
sponsored by Neverfail
CASE STUDY: This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Uses and Misuses for Disk-based Backup
sponsored by ExaGrid Systems, Inc.
EGUIDE: In this E-Guide, expert Jon Toigo offers advice on maximizing the disk storage you have and avoiding the tendency to use this media when it isn't necessary.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

ExaGrid Systems, Inc.

Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions
sponsored by SEPATON
EGUIDE: This E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

SEPATON

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva
151 - 175 of 651 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement