IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
226 - 250 of 657 Matches Previous Page  | Next Page
Secure By Design: Building Identity-based Security into Today’s Information Systems
sponsored by IBM
WHITE PAPER: Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

IBM

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

TechTalk Podcast: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PODCAST: In this exclusive podcast, expert Jon Toigo provides a glimpse into the tape landscape, analyzing its changing role in the data center and what's in store for the future. Hear about options and best practices for tape encryption as well as steps you can take to optimize the performance of this media.
Posted: 11 Feb 2013 | Premiered: Jan 24, 2013

Iron Mountain

Tape's New Niche: Long-Term Data Retention
sponsored by Iron Mountain
EGUIDE: This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.
Posted: 11 Feb 2013 | Published: 13 Mar 2013

Iron Mountain

4 Reasons to Keep Tape as Part of Your Back-Up Strategy
sponsored by Iron Mountain
WHITE PAPER: Access this brief paper to uncover 4 reasons to keep tape as part of your backup strategy.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

Iron Mountain

8 Questions to Ask Before Moving to the Cloud
sponsored by Symantec Corporation
EGUIDE: Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Symantec Corporation

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by Webroot
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Webroot

Mobile: The Technology Game-Changer in 2013
sponsored by Webroot
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Webroot

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

Storage Magazine: February
sponsored by SearchStorage.com
EZINE: Each year, new storage challenges come to the surface, and vendors set out on creating solutions to overcome them. In this issue of Storage Magazine, our editors examine the current storage lineup and reveal the offerings that stand out across six critical categories.
Posted: 12 Feb 2013 | Published: 01 Feb 2013

SearchStorage.com

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

New Stats and Tools Dispel Prevailing VM Backup Myths
sponsored by Idera
EGUIDE: In this expert, exclusive E-Guide from SearchDataBackup.com, learn about other myths surrounding VM backup and explore the results of a 2012 survey your peers took regarding data protection for VMs. Read on to catch up on the most recent developments that have simplified the virtual data protection space.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Idera

Emergency Management Plans Made Easy & Practical
sponsored by VMware, Inc.
EGUIDE: Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

VMware, Inc.

Implementing Replication: Balancing Cost vs. Convenience
sponsored by SearchStorage.com
EBOOK: Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

Backup Apps: State of the Art
sponsored by SearchStorage.com
EDITORIAL RESOURCE GUIDE: Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by More Direct
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

More Direct

VM backup methods for quick VM recovery
sponsored by CommVault Systems, Inc.
EGUIDE: Discover two VM backup methods that can get your server back online in minutes. This expert e-guide outlines these essential approaches for faster recovery time
Posted: 16 Jan 2013 | Published: 16 Jan 2013

CommVault Systems, Inc.

Expert Tips for Implementing Cloud Storage
sponsored by OnX USA LLC
EGUIDE: Access this SearchStorage.com E-Guide to find strategies to consider and leverage before implementing cloud techs in your infrastructure. Read on for industry ace Arun Taneja's insight into cautions about signing on with a cloud storage provider before you have the details on them, and explore long-term considerations for your cloud environment.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

OnX USA LLC

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Top 5 Enterprise Mobile Security Issues
sponsored by Mocana
EGUIDE: While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM
226 - 250 of 657 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement