IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
226 - 250 of 650 Matches Previous Page  | Next Page
Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

TechTalk Podcast: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PODCAST: In this exclusive podcast, expert Jon Toigo provides a glimpse into the tape landscape, analyzing its changing role in the data center and what's in store for the future. Hear about options and best practices for tape encryption as well as steps you can take to optimize the performance of this media.
Posted: 11 Feb 2013 | Premiered: Jan 24, 2013

Iron Mountain

Tape's New Niche: Long-Term Data Retention
sponsored by Iron Mountain
EGUIDE: This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.
Posted: 11 Feb 2013 | Published: 13 Mar 2013

Iron Mountain

4 Reasons to Keep Tape as Part of Your Back-Up Strategy
sponsored by Iron Mountain
WHITE PAPER: Access this brief paper to uncover 4 reasons to keep tape as part of your backup strategy.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

Iron Mountain

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Secure Offsite Data Storage: It Keeps You Running
sponsored by Iron Mountain
TECHNICAL ARTICLE: Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage.
Posted: 28 Nov 2012 | Published: 22 Oct 2012

Iron Mountain

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

Storage Magazine: February
sponsored by SearchStorage.com
EZINE: Each year, new storage challenges come to the surface, and vendors set out on creating solutions to overcome them. In this issue of Storage Magazine, our editors examine the current storage lineup and reveal the offerings that stand out across six critical categories.
Posted: 12 Feb 2013 | Published: 01 Feb 2013

SearchStorage.com

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

New Stats and Tools Dispel Prevailing VM Backup Myths
sponsored by Idera
EGUIDE: In this expert, exclusive E-Guide from SearchDataBackup.com, learn about other myths surrounding VM backup and explore the results of a 2012 survey your peers took regarding data protection for VMs. Read on to catch up on the most recent developments that have simplified the virtual data protection space.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Idera

Emergency Management Plans Made Easy & Practical
sponsored by VMware, Inc.
EGUIDE: Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

VMware, Inc.

Implementing Replication: Balancing Cost vs. Convenience
sponsored by SearchStorage.com
EBOOK: Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

Backup Apps: State of the Art
sponsored by SearchStorage.com
EDITORIAL RESOURCE GUIDE: Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by More Direct
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

More Direct

VM backup methods for quick VM recovery
sponsored by CommVault Systems, Inc.
EGUIDE: Discover two VM backup methods that can get your server back online in minutes. This expert e-guide outlines these essential approaches for faster recovery time
Posted: 16 Jan 2013 | Published: 16 Jan 2013

CommVault Systems, Inc.

Expert Tips for Implementing Cloud Storage
sponsored by OnX USA LLC
EGUIDE: Access this SearchStorage.com E-Guide to find strategies to consider and leverage before implementing cloud techs in your infrastructure. Read on for industry ace Arun Taneja's insight into cautions about signing on with a cloud storage provider before you have the details on them, and explore long-term considerations for your cloud environment.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

OnX USA LLC

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Top 5 Enterprise Mobile Security Issues
sponsored by Mocana
EGUIDE: While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

BYOPC Strategy: Policies and Problem Solving
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Dell, Inc. and IntelĀ®

Four DLP Best Practices To Enhance Security
sponsored by Lumension
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

Lumension

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by Fiberlink
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

Fiberlink

Comparing Email Archiving Software with General Archiving Software
sponsored by Symantec Corporation
EGUIDE: Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation
226 - 250 of 650 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement