IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
26 - 50 of 735 Matches Previous Page  |  Next Page
Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van
sponsored by Ambra
CASE STUDY: Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Case Study: Disc Comfort Fuses Image Management and the Cloud
sponsored by Ambra
CASE STUDY: Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS
sponsored by Ambra
CASE STUDY: Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

The New World of Unified Image Management
sponsored by Ambra
EBOOK: In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Ambra

Transition to a More Flexible Infrastructure with Software-Defined Storage
sponsored by IBM
VIDEO: Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.
Posted: 20 Sep 2016 | Premiered: 28 Jan 2016

IBM

SLA-Driven Data Protection Modernization: An ESG Video Interview
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 20 Sep 2016 | Premiered: 31 Mar 2016

IBM

Achieving Maximum Backup Granularity
sponsored by Veeam Software
WEBCAST: Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.
Posted: 15 Sep 2016 | Premiered: Sep 9, 2015

Veeam Software

IBM Data Protection Modernization and Strategy: An ESG Webinar
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 30 Aug 2016 | Premiered: 31 Mar 2016

IBM

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Simplified Data Protection for the Modern Enterprise: An Expert Evaluation
sponsored by IBM
VIDEO: Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.
Posted: 29 Aug 2016 | Premiered: 30 Mar 2016

IBM

Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM

CW Nordics August 2016
sponsored by ComputerWeekly.com
EBOOK: The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.
Posted: 09 Aug 2016 | Published: 10 Aug 2016

ComputerWeekly.com

Backupify for Office 365: Return of the Data
sponsored by Datto, Inc.
EBOOK: This e-book highlights a secure backup and recovery solution for Office 365. Discover how you can enable automatic backups and capacity planning with a backup solution that includes features such as built-in data encryption, export capabilities, compliance controls, and more.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Datto, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Secure Hosting Creates Foundation for Innovative Telemedicine
sponsored by BT
CASE STUDY: In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Discover how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Equinix
26 - 50 of 735 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement