IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
201 - 225 of 676 Matches Previous Page  |  Next Page
Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Top 10 BYOD Pitfalls to Avoid
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

SearchSecurity.com

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Rethink Defense-In-Depth Security Model For BYOD
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchSecurity.com

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Security Think Tank: Bring your own device
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Expert Overview: New Data Protection Strategies and Success Metrics
sponsored by EMC Corporation
EGUIDE: This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Data Integrity and Recoverability: 4 Essential Elements
sponsored by EMC Corporation
WHITE PAPER: This white paper explores a disk-based backup solution with deduplication that provides the ultimate protection and assurance of recovery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Demonstrating Proven Business Value Through Backup Redesign with EMC: Not Enough Hours in the Day for Backup
sponsored by EMC
WHITE PAPER: This informative resource discusses how one organization easily and affordably implemented a backup solution that provides efficiency and resilience to conquer the challenges of today's IT landscape.
Posted: 18 Jul 2013 | Published: 30 Apr 2012

EMC

Secure Your Backup Tapes Every Step of the Way
sponsored by Iron Mountain
DATA SHEET: This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.
Posted: 17 Jul 2013 | Published: 31 Jul 2012

Iron Mountain

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST: In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013

Oracle Corporation

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Expanding Web Single Sign-On to Cloud and Mobile
sponsored by CA Technologies.
WHITE PAPER: This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience.
Posted: 11 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013

BlackBerry

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

IBM Power Systems Keep Your Applications Ready for Anything
sponsored by IBM
WHITE PAPER: This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
Posted: 26 Jun 2013 | Published: 30 Apr 2012

IBM

Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Data Systems
EBOOK: This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Hitachi Data Systems

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems

Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
sponsored by Neverfail
CASE STUDY: This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail
201 - 225 of 676 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement