IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
201 - 225 of 700 Matches Previous Page  | Next Page
Security Think Tank: Bring your own device
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

How to Avoid the Coming Backup Crunch
sponsored by Dell Software
WHITE PAPER: In this brief white paper, you will discover an innovative approach to the rapid data growth conundrum. Learn how you can capture continuous backup snapshots, automate recoverability testing and offload data deduplication/compression tasks.
Posted: 18 Jun 2013 | Published: 31 Jul 2012

Dell Software

The Economic Value of Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Big data analytics promises to boost customer centricity and profitability for financial services firms, according to this report from Cognizant.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

ComputerWeekly.com

Mobile Device Data Protection: Key Findings and Players in the Market
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

SearchSecurity.com

Challenges With Data Protection in the Cloud
sponsored by SearchSecurity.com
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

SearchSecurity.com

Agentless Backup—Separating Myth from Reality
sponsored by Asigra
WHITE PAPER: This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Asigra

Best Practices for Data Management
sponsored by Iron Mountain
EBOOK: This interactive eBook explores best practices for data management and dives into two questions answering how are current data management programs preforming relative to best practices? And what are the implications for backup and recovery practices moving forward?
Posted: 07 Jun 2013 | Published: 20 Mar 2013

Iron Mountain

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

Developing Effective DR/BC Plans
sponsored by Iron Mountain
EZINE: This Essential Guide offers a primer on business continuity and risk management.  Get exclusive information on tailoring a DR plan to your organization's needs and discover 10 things every IT professional should know about disaster recovery. Read on to make DR planning a priority before it's too late.
Posted: 31 May 2013 | Published: 31 May 2013

Iron Mountain

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Three Critical Decisions You Need to Make at the First Sign of a Security Breach
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Data Systems
EBOOK: This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Hitachi Data Systems

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems

Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
sponsored by Neverfail
CASE STUDY: This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Uses and Misuses for Disk-based Backup
sponsored by ExaGrid Systems, Inc.
EGUIDE: In this E-Guide, expert Jon Toigo offers advice on maximizing the disk storage you have and avoiding the tendency to use this media when it isn't necessary.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

ExaGrid Systems, Inc.

Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions
sponsored by SEPATON
EGUIDE: This E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

SEPATON

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Security University: Data Loss Prevention
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Dive into this SearchSecurity.com classroom to learn the difference between suite and point product approaches. Find out how to assess what to focus on within your own organization, and learn the pitfalls in DLP implementation.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013

SearchSecurity.com

Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
Posted: 14 Jun 2013 | Published: 31 Oct 2011

EMC & Arrow

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Archiving, Backup, and DR: Essential Tips and Issues to Address
sponsored by Rand Secure Data
EGUIDE: This E-Guide points out four records retention issues you may inadvertently be exposing your business to and reveals the keys to integrating backup, archiving, and DR.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

Rand Secure Data

Storage magazine June 2013: Archive It!
sponsored by SearchStorage.com
EZINE: In the June 2013 issue of Storage magazine, our experts highlight the latest in data archiving best practices, reveal the winners of our latest Quality Awards survey for backup and recovery software, explore the challenges of mobile device backup and much more!
Posted: 07 Jun 2013 | Published: 07 Jun 2013

SearchStorage.com

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.
201 - 225 of 700 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement