IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
226 - 250 of 709 Matches Previous Page  | Next Page
Agentless Backup—Separating Myth from Reality
sponsored by Asigra
WHITE PAPER: This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Asigra

Three Key Steps to Achieving Mobile Security Harmony
sponsored by IBM
WHITE PAPER: In order to protect sensitive data, you'll need to take special care to ensure that you are implementing the robust controls needed to prevent both unintentional loss and malicious theft. Read this informative whitepaper in order to learn how to choose and implement data security controls effectively.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

IBM

Best Practices for Data Management
sponsored by Iron Mountain
EBOOK: This interactive eBook explores best practices for data management and dives into two questions answering how are current data management programs preforming relative to best practices? And what are the implications for backup and recovery practices moving forward?
Posted: 07 Jun 2013 | Published: 20 Mar 2013

Iron Mountain

Top 10 Reasons Federated Deduplication Is the Right Data Protection Strategy
sponsored by HP Autonomy
WHITE PAPER: Read this whitepaper to learn 10 reasons federated deduplication makes sense for your busy, growing, and resource-conscious IT operations.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

HP Autonomy

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

Developing Effective DR/BC Plans
sponsored by Iron Mountain
EZINE: This Essential Guide offers a primer on business continuity and risk management.  Get exclusive information on tailoring a DR plan to your organization's needs and discover 10 things every IT professional should know about disaster recovery. Read on to make DR planning a priority before it's too late.
Posted: 31 May 2013 | Published: 31 May 2013

Iron Mountain

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Three Critical Decisions You Need to Make at the First Sign of a Security Breach
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Success Story: University Improves Backup and Recovery by Ditching Tape
sponsored by ExaGrid Systems, Inc.
CASE STUDY: This two-page paper explores how UNI deployed an effective and affordable backup solution. Read on to discover the benefits they now enjoy.
Posted: 21 May 2013 | Published: 21 May 2013

ExaGrid Systems, Inc.

International technology adoption & workforce issues
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study from CompTia,  looks at technology and workforce recruitment trends across 10 countries.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Threat Detection (Antivirus Intrusion Prevention)
sponsored by Windstream Communications
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

Windstream Communications

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Archiving, Backup, and DR: Essential Tips and Issues to Address
sponsored by Rand Secure Data
EGUIDE: This E-Guide points out four records retention issues you may inadvertently be exposing your business to and reveals the keys to integrating backup, archiving, and DR.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

Rand Secure Data

Storage magazine June 2013: Archive It!
sponsored by SearchStorage.com
EZINE: In the June 2013 issue of Storage magazine, our experts highlight the latest in data archiving best practices, reveal the winners of our latest Quality Awards survey for backup and recovery software, explore the challenges of mobile device backup and much more!
Posted: 07 Jun 2013 | Published: 07 Jun 2013

SearchStorage.com

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Data protection strategies for rapid, effective data center recovery
sponsored by Dell and VMware
WHITE PAPER: This white paper explores a storage platform that includes a comprehensive set of data protection capabilities that help you meet operational and DR requirements at both local and remote sites.
Posted: 17 May 2013 | Published: 31 Dec 2012

Dell and VMware

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Agent based vs host based virtualization backups: has the market shifted?
sponsored by Symantec Corporation
EGUIDE: This E-Guide provides insight into the evolution of data protection for virtual environments and reveals how host-based virtualization backups used to be king, but agent-based approaches are now catching on.
Posted: 13 May 2013 | Published: 13 May 2013

Symantec Corporation

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos, Inc.
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos, Inc.

Threat Prevention Techniques: Best Practices for Threat Management
sponsored by GeoTrust, Inc.
EGUIDE: SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
Posted: 02 May 2013 | Published: 02 May 2013

GeoTrust, Inc.

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com
226 - 250 of 709 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement