IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
176 - 200 of 699 Matches Previous Page  | Next Page
Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

LTFS Is a Game-Changing Technology: Extends Use Cases for Tape-Based Archiving
sponsored by Iron Mountain
WHITE PAPER: This informative white paper discusses LTFS by exploring its benefits and use cases for tape-based archiving.
Posted: 18 Jul 2013 | Published: 31 May 2013

Iron Mountain

Secure Your Backup Tapes Every Step of the Way
sponsored by Iron Mountain
DATA SHEET: This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.
Posted: 17 Jul 2013 | Published: 31 Jul 2012

Iron Mountain

Tape Robotics Today
sponsored by Iron Mountain
PODCAST: In this recording, Ben Woo, managing director of storage consultancy at Neuralytix, discusses recent developments in the area of tape library robotics.
Posted: 17 Jul 2013 | Premiered: Aug 30, 2012

Iron Mountain

FAQ: How to Protect Macs in Your Enterprise
sponsored by Code42
WHITE PAPER: Check out this exclusive white paper to explore five frequently asked questions about how to best protect Macs in your enterprise.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Code42

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Top 10 BYOD Pitfalls to Avoid
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

SearchSecurity.com

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Rethink Defense-In-Depth Security Model For BYOD
sponsored by McAfee, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

McAfee, Inc.

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

IBM Power Systems and Their Support for Business Resilience in Challenging IT Environments
sponsored by IBM
WHITE PAPER: This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
Posted: 26 Jun 2013 | Published: 30 Apr 2012

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Data Integrity and Recoverability: 4 Essential Elements
sponsored by EMC Corporation
WHITE PAPER: This white paper explores a disk-based backup solution with deduplication that provides the ultimate protection and assurance of recovery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Demonstrating Proven Business Value Through Backup Redesign with EMC: Not Enough Hours in the Day for Backup
sponsored by EMC
WHITE PAPER: This informative resource discusses how one organization easily and affordably implemented a backup solution that provides efficiency and resilience to conquer the challenges of today's IT landscape.
Posted: 18 Jul 2013 | Published: 30 Apr 2012

EMC

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST: In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013

Oracle Corporation

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control
sponsored by CA Technologies.
WHITE PAPER: This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

CA Technologies.

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Expanding Web Single Sign-On to Cloud and Mobile
sponsored by CA Technologies.
WHITE PAPER: This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience.
Posted: 11 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013

BlackBerry

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

Backup Software: Recent Developments and Vendor Rankings
sponsored by CommVault Systems, Inc.
EGUIDE: This E-Guide evaluates the top enterprise and midrange backup applications in the marketplace and rates them across five key categories
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

Compliance Considerations for Backup and Recovery
sponsored by CommVault Systems, Inc.
EGUIDE: This e-guide underscores the importance of physical security policies and proper account usage and explains how they can prevent theft and potential data breaches.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Data Systems
EBOOK: This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Hitachi Data Systems
176 - 200 of 699 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement