IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
26 - 50 of 660 Matches Previous Page  |  Next Page
How Adaptive DLP is Securing the Agile Enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies, highlighting 5 vital areas in which adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Financial Organizations: Controlling Secure Communications
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.
Posted: 04 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Securing Shared Data through FSS systems
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how a robust file sync and share (FSS) system can secure data accessed by collaborators.
Posted: 29 Apr 2015 | Published: 30 Dec 2014

IntraLinks, Inc

Securing Collaborative Data
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to secure remote users and manage documents to eliminate multiple versions and confusion.
Posted: 28 Apr 2015 | Published: 01 Apr 2015

IntraLinks, Inc

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Lab Report: SIOS DataKeeper Replication for Windows Clusters
sponsored by SIOS Technology Corp
RESOURCE: Access this extensive study to learn just how effective DataKeeper is in an SQL Server 2012 environment. Discover how this software performed when cluster nodes failed. Read now to delve deeper into DataKeeper's implementation, and set up process to determine if it could help your organization with their data replication needs.
Posted: 20 Apr 2015 | Published: 31 Dec 2014

SIOS Technology Corp

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5-step approach. Access this resource now to discover how to overcome common data security struggles.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Top Five Considerations for Oracle Database Replication Platforms
sponsored by Dell Software
RESOURCE: This business brief explores the top five reasons to chooseSharePlex® over Oracle GoldenGate, a competing datareplication solution for your Oracle database environment.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Dell Software

The Critical Security Controls: What's NAC Got to Do with IT?
sponsored by ForeScout Technologies, Inc.
PRODUCT REVIEW: This white paper discusses the capabilities of next-generation NAC and explains why it's an essential part of securing the modern enterprise.
Posted: 18 Feb 2015 | Published: 31 Jan 2015

ForeScout Technologies, Inc.

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

One Size Never Fits All: Optimizing your Organization with Backup Built for Your Business
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines why the "one-size-fits-all" may not be the best approach for data backup and how it can potentially cause IT departments to over-pay or under-protect. You'll also learn about a data protection platform that provides uniquely tailored tools for physical, virtual and cloud workloads across almost any OS environment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

Technical Report: Software-Defined Storage with NetApp and VMware
sponsored by NetApp
TECHNICAL ARTICLE: This jointly authored technical report describes a software-defined storage solution based on NetApp and VMWare technology. Download this report and learn how to build your own SDDC.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

NetApp

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Solarwinds N-able

Get the Upper Hand on Virtual Machine Sprawl
sponsored by SearchServerVirtualization
EBOOK: As hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

SearchServerVirtualization

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com
26 - 50 of 660 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement