Data Loss Prevention (DLP) Reports

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

SharePoint E-zine - Volume 14: Creating an InfoPath Development Strategy
sponsored by TechTarget Search Windows Server
EZINE: InfoPath is a powerful SharePoint tool, but the easiest techniques aren't always the best ones. In this month's issue, learn how to incorporate best practices into your InfoPath forms development process to yield the biggest benefit for your company.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

TechTarget Search Windows Server

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection
sponsored by IBM
WEBCAST: In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts.
Posted: 17 Sep 2009 | Premiered: Sep 24, 2009, 12:00 EDT (16:00 GMT)

IBM

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Presentation Transcript: The Future of Information-Centric Security
sponsored by Palisade Systems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business.
Posted: 11 Sep 2009 | Published: 04 Sep 2009

Palisade Systems, Inc.

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER: Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Code Green Networks, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

6 Steps to Prevent a Data Breach
sponsored by Symantec Corporation
BROCHURE: Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Symantec Corporation

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Storage Magazine September 2009: The Lowdown on Solid-State Storage
sponsored by TechTarget Storage
EZINE: Storage Magazine Online September 2009 features a cover story updating the speedy evolution of Solid-State Storage – and what factors are transforming this technology from a niche to standard practice for storage shops.
Posted: 31 Aug 2009 | Published: 01 Sep 2009

TechTarget Storage

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Database Crime Scene Prevention
sponsored by Imperva
TECHNICAL ARTICLE: This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
Posted: 19 Aug 2009 | Published: 20 Feb 2009

Imperva

Entitlement Reviews: A Practitioner's Guide
sponsored by Varonis
WHITE PAPER: This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
sponsored by Symantec Corporation
WHITE PAPER: Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
Posted: 11 Jun 2009 | Published: 11 Jun 2009

Symantec Corporation

Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Posted: 09 Jun 2009 | Published: 06 May 2009

Symantec Corporation

Breakthrough Data Recovery for AIX - Vision Solutions
sponsored by Vision Solutions
PODCAST: The purpose of this podcast is to provide a roadmap to the most effective strategy and technology to protect data and provide fast recovery for data which is lost or corrupted due to accident and malicious action.
Posted: 09 Apr 2008 | Premiered: Apr 9, 2008

Vision Solutions