Data Loss Prevention (DLP) Reports

Why Cloud Backup: Top 10 Reasons
sponsored by Iron Mountain
WHITE PAPER: Increasingly, organizations are adopting cloud backup solutions to address their data protection challenges. Read this white paper to learn more.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email
sponsored by Coviant Software Corporation
WHITE PAPER: Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.
Posted: 15 Dec 2010 | Published: 14 Dec 2010

Coviant Software Corporation

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Cost Effective Techniques for Designing the Data Warehouse
sponsored by Embarcadero Technologies, Inc.
WEBCAST: A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now.
Posted: 30 Nov 2010 | Premiered: Nov 30, 2010

Embarcadero Technologies, Inc.

Symantec 2010 SMB Information Protection Survey
sponsored by Symantec Corporation
WHITE PAPER: Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.
Posted: 29 Nov 2010 | Published: 29 Nov 2010

Symantec Corporation

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.

What is Tape Without Pain?
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

Spectra Logic Corporation

Laptop Backup FAQ
sponsored by Druva
PRESENTATION TRANSCRIPT: This Presentation Transcript sponsored by Druva Inc., focuses on a conversation between Lauren Whitehouse, Senior Analyst with Enterprise Strategy Group, and Andrew Burton, editor of SearchDataBackup.com. Their discussion revolves around backing up important data on your laptop and the best ways to go about doing this. Read on to learn more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Druva

Laptop Backup for Remote Workforce
sponsored by Druva
WHITE PAPER: This whitepaper discusses the key concerns in remote-backup (like bandwidth and network access) and the shortcomings in existing solutions which makes employees avoid backups. Learn more by accessing this paper today.
Posted: 18 Oct 2010 | Published: 18 Oct 2010

Druva

Data Deduplication and Druva inSync
sponsored by Druva
WHITE PAPER: Enterprises are seeking new ways to keep up with the challenges of managing and protecting their rapidly expanding corporate data. While data growth is not new, the pace of growth has become more rapid, the location of data more dispersed, and the linkage between data sets more complex. This hitepaper explains source based deduplication technology.
Posted: 18 Oct 2010 | Published: 18 Oct 2010

Druva

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

Developing a Data Protection Strategy for Virtual Server Environments
sponsored by i365, makers of Evault
WHITE PAPER: Virtualization is no longer strictly an enterprise technology; it is increasingly being adopted by IT groups in small and mid-size businesses (SMBs). However, those organizations are quickly learning that virtualization can also increase complexity in certain areas of IT, particularly in data protection. Read this white paper to learn more.
Posted: 29 Sep 2010 | Published: 29 Sep 2010

i365, makers of Evault

Cloud Backup and Recovery
sponsored by Vision Solutions
WHITE PAPER: The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Vision Solutions

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

HP Data Protector software Granular Recovery Extension for SharePoint 2007 FAQ
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Used by more than 37,000 customers worldwide, HP Data Protector provides automated backup and recovery of physical and virtual servers from disk or tape. Read this paper to learn answers to some of the most frequently asked questions about HP Data Protector software and the Granular Recovery Extension for SharePoint 2007.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

Hewlett Packard Enterprise

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

Insight

Five Network Security Threats and How to Protect Your Business
sponsored by Qwest Communications
WHITE PAPER: Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
Posted: 26 Aug 2010 | Published: 25 Aug 2010

Qwest Communications

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

A Fluid Data Architecture Pays Off for CMA
sponsored by Dell Compellent
CASE STUDY: Financial institutions worldwide depend upon the credibility and security of Credit Market Analysis (CMA’s) products and services daily. CMA’s approach to market analysis creates large volumes of highly sensitive data that require secure management and storage. CMA has been running a Dell Compellent enterprise storage solution for over two years.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

Dell Compellent

Presentation Transcript: Integrating Backup and DR into a Single Solution
sponsored by InMage Systems
PRESENTATION TRANSCRIPT: What if disaster recovery and backup systems were integrated and easily managed as a single solution? Read this presentation transcript to learn more about making this integration more of a reality with a flexible backup solution that reduces backup windows and increases restore time tremendously.
Posted: 18 Jun 2010 | Published: 17 Jun 2010

InMage Systems