IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
26 - 50 of 652 Matches Previous Page  |  Next Page
Lightning Fast Recovery To and From the Cloud
sponsored by Vision Solutions
WHITE PAPER: Access this helpful resource today to learn the secret to restoring your systems to normal operating capacity quickly and painlessly following an outage.
Posted: 27 Mar 2015 | Published: 30 Dec 2011

Vision Solutions

Going Mobile: Best Practices for Centrally Ensuring a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: With the uptick in Bring Your Own Device (BYOD) practices, IT is inundated with the responsibility of ensuring the portability of their business resources. Access this informative infographic to learn what it takes to effectively unify management of all endpoints no matter where they may reside.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

FrontRange Solutions Inc.

The fast, flexible approach to optimize and automate your SAP data operations
sponsored by Winshuttle, LLC
VIDEO: Access this concise video to learn how you can decrease risk, errors and delays in your data entry and processing by shoring up your data quality. Discover how lean data management can streamline collection validation and movement of your data by building upon existing investments.
Posted: 05 Mar 2015 | Premiered: 05 Mar 2015

Winshuttle, LLC

Top Five Considerations for Oracle Database Replication Platforms
sponsored by Dell Software
RESOURCE: his business brief explores the top five reasons to chooseSharePlex® over Oracle GoldenGate, a competing datareplication solution for your Oracle database environment.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Dell Software

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Get the Upper Hand on Virtual Machine Sprawl
sponsored by SearchServerVirtualization
EBOOK: As hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

SearchServerVirtualization

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

One Size Never Fits All: Optimizing your Organization with Backup Built for Your Business
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines why the "one-size-fits-all" may not be the best approach for data backup and how it can potentially cause IT departments to over-pay or under-protect. You'll also learn about a data protection platform that provides uniquely tailored tools for physical, virtual and cloud workloads across almost any OS environment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

Forrester Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
sponsored by Absolute Software
WHITE PAPER: The following white paper discusses the current state of endpoint data loss in healthcare organizations using the current breach data to highlight the need for a data-centric approach to endpoint security on all employee devices. In addition, this paper intends to illustrate an approach that can lead to fewer compliance violations and reduced risk.
Posted: 21 Oct 2014 | Published: 04 Sep 2014

Absolute Software

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Solarwinds N-able

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by Solarwinds N-able
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

Solarwinds N-able

Bringing Your Corporate Content and Apps into the Mobile Era
sponsored by IBM
WHITE PAPER: This white paper explores how organizations can embrace, plan, and deploy a comprehensive mobile strategy that harnesses the power of mobility with secure access to business resources.
Posted: 22 Jul 2014 | Published: 29 Jul 2011

IBM

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by Commvault
VIDEO: Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 08 Jul 2014 | Premiered: 27 Jun 2014

Commvault

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass
26 - 50 of 652 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement