IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
26 - 50 of 674 Matches Previous Page  |  Next Page
Vendor Blueprint for Virtualized Data Protection: Extending to Hyper-V Environments
sponsored by IBM
WHITE PAPER: This ESG Lab Review documents the testing of one data protection solution for virtual environments, with a particular focus on ease of use, flexibility, and architecture efficiency. Access this white paper to protect your VMware and Windows Hyper-V environments.
Posted: 01 Sep 2015 | Published: 31 Jul 2015


Data Breach Readiness 2.0
sponsored by
RESEARCH CONTENT: Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015


Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015


High Availability is not a Luxury: How to Eliminate Downtime
sponsored by arcserve
WHITE PAPER: It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.
Posted: 26 Aug 2015 | Published: 26 Aug 2015


E-guide Exclusive: The Top 3 Tips for Selecting a DRaaS Provider
sponsored by Assuritive
EGUIDE: In this exclusive e-guide, expert Paul Kirvan shows you the pitfalls to avoid when considering DRaaS to support your mission-critical enterprise systems. Read on here to access the following guiding principles when choosing DRaaS.
Posted: 25 Aug 2015 | Published: 25 Aug 2015


Transforming Big Data Challenges into Prime Business Insights
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains how to take control of your data deluge, and turn it into an advantage to leverage insight for your enterprise. Read on to see how to achieve increased innovation and productivity.
Posted: 13 Aug 2015 | Published: 29 Jan 2015

Dell, Inc. and Intel®

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Managed Backup: More Versatile Than Ever
sponsored by Solarwinds N-able
WHITE PAPER: Managed backup gives you the ability to recover your data lost from power outages, viruses, natural disasters, accidental deletions, and hardware failures. This white paper provides a way for you to seamlessly protect your customers' valuable data.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Bridging the Gap between On-Premises and Cloud Data and Processes
sponsored by IBM
RESOURCE: This brief infographic explores how to bridge cloud and on-premises environments as one cohesive hybrid environment to operate fluidly.
Posted: 08 Jul 2015 | Published: 03 Jun 2015


DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015


5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WHITE PAPER: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Published: 05 Nov 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Top Marketing Data Collaboration Challenges
sponsored by IntraLinks, Inc
WHITE PAPER: In this whtie paper, discover the 6 data security and control challenges that marketing departments face and how to reduce risk and loss.
Posted: 15 May 2015 | Published: 06 May 2015

IntraLinks, Inc

Data and Document Governance for Legal Departments
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative strategy to data and document governance to reduce risk for legal departments.
Posted: 15 May 2015 | Published: 08 Apr 2015

IntraLinks, Inc

Mitigating Data Sharing Risks and Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative approach to reducing data sharing risks between internal teams and outside parties. View now to learn how to safeguard data and files and minimize leaks.
Posted: 14 May 2015 | Published: 25 Mar 2015

IntraLinks, Inc

The Collaborative Data Privacy Handbook
sponsored by IntraLinks, Inc
WHITE PAPER: As more organizations share sensitive data, the risk of leak or theft increases.  This white paper outlines six steps to improving data privacy and sharing principles and preventing regulatory and market sanctions.
Posted: 13 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

Is it time for a DLP system in your enterprise?
sponsored by
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black
26 - 50 of 674 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement