IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
201 - 225 of 714 Matches Previous Page  | Next Page
Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Better Management: Prevent Backup Failures
sponsored by APTARE
CASE STUDY: This white paper explores how one organization easily and affordably deployed a backup solution that helps them prevent backup failures through better management and reporting of their data protection processes.
Posted: 05 Jul 2013 | Published: 28 Jun 2013

APTARE

Integrate Trouble Ticketing and Avoid 3 Serious Consequences of Backup Non-compliance
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that saves them millions of dollars annually by utilizing its trouble ticketing feature.
Posted: 05 Jul 2013 | Published: 28 Jun 2013

APTARE

How Data Protection Management Can Overcome Backup Challenges
sponsored by APTARE
WHITE PAPER: This white paper explores seven of today's major compliance challenges and highlights how one data protection solution can help organizations address them.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Backup Duplication Report Ensures All Backups are Completed
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that ensures all backups are completed for all copies of their data.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Consolidated Management: Resolve, Report and Prevent Backup Failures
sponsored by APTARE
WHITE PAPER: This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Rethink Defense-In-Depth Security Model For BYOD
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchSecurity.com

A Comprehensive View Across the Entire Backup Process
sponsored by APTARE
WHITE PAPER: This white paper examines a data protection solution that provides extensive visibility into storage allocation, utilization and backup to meet today's demanding compliance requirements.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Backup and Compliance: End-to-End Visibility into the Backup Environment
sponsored by APTARE
WHITE PAPER: This short white paper explores a data protection solution that provides end-to-end visibility to ensure sustainable compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Meet SLAs and Improve Backup Success Rate
sponsored by APTARE
CASE STUDY: Check out this short case study to examine how one company implemented a backup software to help streamline backup processes and improve their backup success rate.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

IBM Power Systems Keep Your Applications Ready for Anything
sponsored by IBM
WHITE PAPER: This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
Posted: 26 Jun 2013 | Published: 30 Apr 2012

IBM

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Citrix

Security Think Tank: Bring your own device
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

Backup Software: Recent Developments and Vendor Rankings
sponsored by CommVault Systems, Inc.
EGUIDE: This E-Guide evaluates the top enterprise and midrange backup applications in the marketplace and rates them across five key categories
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

Compliance Considerations for Backup and Recovery
sponsored by CommVault Systems, Inc.
EGUIDE: This e-guide underscores the importance of physical security policies and proper account usage and explains how they can prevent theft and potential data breaches.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

CommVault Systems, Inc.

File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Data Systems
EBOOK: This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Hitachi Data Systems

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems

Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
sponsored by Neverfail
CASE STUDY: This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Uses and Misuses for Disk-based Backup
sponsored by ExaGrid Systems, Inc.
EGUIDE: In this E-Guide, expert Jon Toigo offers advice on maximizing the disk storage you have and avoiding the tendency to use this media when it isn't necessary.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

ExaGrid Systems, Inc.

Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions
sponsored by SEPATON
EGUIDE: This E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

SEPATON
201 - 225 of 714 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement