IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
226 - 250 of 640 Matches Previous Page  |  Next Page
Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

How to configure Mac OS X Server
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This step by step guide shows you how to configure Max OS X Server.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by SearchSecurity.com
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by SearchSecurity.com
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Implementing Replication: Balancing Cost vs. Convenience
sponsored by SearchStorage.com
EBOOK: Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchStorage.com

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This resource demonstrates how organizations can expand the reach of their security teams with improved data loss prevention offering advanced reporting, improved usability and new security integrations.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

Symantec Corporation

Backup Basics: Disk, CDP and Cloud
sponsored by Barracuda Networks
EGUIDE: Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

Barracuda Networks

What to look for in next-gen data snapshot techs
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript, featuring backup expert Brien Posey, takes a look at the defining characteristics of a next-generation data snapshot and how this technology fits into traditional data protection programs.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

Dell, Inc.

Business Continuity Strategy Development
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: In this video transcript, industry expert Jon Toigo extols the essential elements of a business continuity strategy and offers advice to help you build a plan that embodies each of them.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

Dell, Inc.

Email file recovery opportunities
sponsored by Kroll Ontrack, Inc.
EGUIDE: Access this expert E-Guide from SearchStorageChannel.com to explore email recovery from a reseller perspective and learn topics to cover with clients regarding what they'll pay for recovery testing - and how to relevantly bring it up to them.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Kroll Ontrack, Inc.

Expert Video Tip Transcript: Today's Cloud Backup
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this exclusive Expert Video Tip transcript about current cloud backup options to explore a 10-question Chicago Storage Decisions 2012 Q&A with independent analyst Brien Posey. Read on to learn how cloud backup is being utilized across enterprises and get the scoop on various backup devices.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

Symantec Corporation

8 Questions to Ask Before Moving to the Cloud
sponsored by Symantec Corporation
EGUIDE: Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Symantec Corporation

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

Storage Magazine: February
sponsored by SearchStorage.com
EZINE: Each year, new storage challenges come to the surface, and vendors set out on creating solutions to overcome them. In this issue of Storage Magazine, our editors examine the current storage lineup and reveal the offerings that stand out across six critical categories.
Posted: 12 Feb 2013 | Published: 01 Feb 2013

SearchStorage.com

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

Tape's New Niche: Long-Term Data Retention
sponsored by Iron Mountain
EGUIDE: This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.
Posted: 11 Feb 2013 | Published: 13 Mar 2013

Iron Mountain

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

New Stats and Tools Dispel Prevailing VM Backup Myths
sponsored by Idera
EGUIDE: In this expert, exclusive E-Guide from SearchDataBackup.com, learn about other myths surrounding VM backup and explore the results of a 2012 survey your peers took regarding data protection for VMs. Read on to catch up on the most recent developments that have simplified the virtual data protection space.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Idera

Emergency Management Plans Made Easy & Practical
sponsored by VMware, Inc.
EGUIDE: Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

VMware, Inc.
226 - 250 of 640 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement