IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
151 - 175 of 720 Matches Previous Page  | Next Page
Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

Iron Mountain

Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Why and how to choose the right cloud vendor
sponsored by HP Autonomy
WHITE PAPER: Check out this informative resource to discover how to best choose a service provider for your cloud backup services.
Posted: 22 Aug 2013 | Published: 22 Aug 2013

HP Autonomy

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

The Need for Data Loss Prevention Now
sponsored by Clearswift
WHITE PAPER: This resource takes a deep look at why data leakage prevention (DLP) is so vital to data protection, explains the multiple ways data can leak out of your enterprise, and outlines a five-step approach to reaching DLP nirvana.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

Clearswift

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Clearswift Information Governance: Introducing the Next-Generation DLP Technology
sponsored by Clearswift
WHITE PAPER: Simply put, traditional DLP cannot provide the information governance you need without hindering real-time business processes. Inside, learn how an information governance platform with built-in DCI and adaptive redaction can help.
Posted: 14 Aug 2013 | Published: 14 Aug 2013

Clearswift

TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
WHITE PAPER: Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

How Snapshot and CDP Integrate with Data Backup
sponsored by SearchStorage.com
ESSENTIAL GUIDE: This Handbook explores why one expert believes replication, CDP and snapshots are keys to a successful data backup strategy; how virtualization gives CDP a big boost; and the many types of snapshots available today.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

SearchStorage.com

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013

IBM.

Modernize your data platform with HP Storage and Microsoft SQL Server 2012
sponsored by AdvizeX Technologies
BROCHURE: This resource explores an ideal storage foundation for today's virtualized environments that delivers flexibility, efficiency and a great deal of uptime.
Posted: 26 Aug 2013 | Published: 31 Oct 2012

AdvizeX Technologies

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Vendor Landscape: Disk Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this informative white paper to explore the top ten players in today's disk backup marketplace. See where disk backup is headed in the future and discover which vendor's solution rises above the rest. Read on to discover which offering is best for your business.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

ExaGrid Systems, Inc.

Demystifying Deduplication for Backup with the Dell DR4000
sponsored by Dell Software
WHITE PAPER: A disruption in the availability of data can break business continuity. Any good impact analysis must consider how quickly data access can be restored and how recent the data must be. Tape backup is no longer effective for all scenarios, and disk-based backup presents challenges as well. Is data deduplication the answer? Read the White Paper
Posted: 23 Aug 2013 | Published: 31 Jan 2012

Dell Software

ESG Lab Validation Report: Dell PowerVaultDL4000 Appliance
sponsored by Dell Software
WHITE PAPER: IT teams today are faced with swelling data volumes and expanding virtualization, both of which complicate the protection landscape and challenge your staff's resources. The DL4000 protects both physical and virtual servers, nearly eliminating backup windows and providing recovery assurance for data and applications. Read the Report
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Expert Steps for Meeting VM Storage and Backup Requirements
sponsored by EMC Corporation
EGUIDE: This e-guide examines how storage fits into the virtualization equation and points out the unique challenges associated with backing up virtual machines.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

EMC Corporation

Top 3 Considerations When Building Business Continuity and Disaster Recovery Service Offerings
sponsored by CA Technologies.
WHITE PAPER: Check out this white paper to explore the top three things to consider whilst building your business continuity and disaster recovery strategies.
Posted: 08 Aug 2013 | Published: 30 Apr 2012

CA Technologies.

Cloud Backup and Recovery: Customer Spending Trends and Purchasing Intentions
sponsored by Intronis
EGUIDE: This e-guide outlines four critical risk management strategies MSPs can implement to protect their business and clients and strengthen their position in the competitive cloud market.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Intronis

Cloud Data Protection: Selling Benefits and Overcoming Adoption Barriers
sponsored by Intronis
EGUIDE: This e-guide recaps the benefits of and barriers to cloud data protection services and elaborates on the concept behind hybrid cloud DR.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Intronis

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

EMC VSPEX Server Virtualization Solutions For Small and Medium Business
sponsored by OnX USA LLC
WHITE PAPER: This white paper discusses a pre-validated and modular architecture and its key capabilities that enable complete virtualization.
Posted: 31 Jul 2013 | Published: 29 Feb 2012

OnX USA LLC

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension

How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY: Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Lumension
151 - 175 of 720 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement