IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
51 - 75 of 722 Matches Previous Page  |  Next Page
Data Governance: The True Key to Effective Risk Management
sponsored by Guidance Software, Inc.
EGUIDE: In this eguide, you will learn the real importance of information governance. It's much more than keeping track of digital records for compliance reasons. Discover how to build classification tools and functional descriptive data into our digital assets so they can be accessed for business with increased efficiency.
Posted: 22 Mar 2016 | Published: 18 Mar 2016

Guidance Software, Inc.

Demo: Oracle Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
VIDEO: This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.
Posted: 21 Mar 2016 | Premiered: 04 Aug 2015

Oracle, in association with Intel

Oracle's Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.
Posted: 21 Mar 2016 | Published: 31 Dec 2015

Oracle, in association with Intel

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

An IT Pro’s Guide to Protecting Virtualized Data
sponsored by arcserve
WEBCAST: Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.
Posted: 17 Mar 2016 | Premiered: Nov 30, 2015

arcserve

2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)
sponsored by IBM
TECHNICAL ARTICLE: This article teaches you about next-generation IPSs which offer the best protection and response to advanced threats on endpoints and in the cloud.
Posted: 11 Mar 2016 | Published: 16 Nov 2015

IBM

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & MicroAge
WHITE PAPER: This white paper shows you how to achieve simplicity and flexibility from your data protection. Access now and learn about a simplified, integrated approach that allows your organization to become more flexible while optimizing performance and reducing costs.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

EMC & MicroAge

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.
Posted: 11 Mar 2016 | Published: 31 Oct 2015

EMC & NextNet

Breaking Bad: The Risk of UnsecureFile Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.
Posted: 09 Mar 2016 | Published: 31 Oct 2014

IntraLinks, Inc

IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise
sponsored by IBM
WHITE PAPER: This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

IBM

RailCom Meets Client Needs While Ensuring Corporate Data and Device Security
sponsored by IBM MaaS360
CASE STUDY: In this case study, you will learn how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based EMM solution. Read on to discover how your business can deploy remote wipe, SIM card blocking, and more.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

IBM MaaS360

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Oracle Backup and Recovery Strategies: Moving to Data-Protection-as-a-Service
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper reviews best practices for data protection approaches for backup up Oracle databases. Read on to discover how you can effectively protect your data and provide greater granularity on an application-by-application bases while reducing your RPO and RTO.
Posted: 24 Feb 2016 | Published: 22 Oct 2015

Oracle, in association with Intel

Open Source Security Needed in Development
sponsored by Black Duck Software
WHITE PAPER: With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.
Posted: 24 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 24 Feb 2016 | Published: 15 Dec 2015

Imperva

Secure and Manage Open Source Software
sponsored by Black Duck Software
WHITE PAPER: This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Next-Generation Endpoint Security for Dummies
sponsored by Carbon Black
EBOOK: This e-book explains how all organizations are targeted in today's advanced threat environment. Discover how endpoints can serve as vulnerabilities to adversaries seeking to exploit your enterprise.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Carbon Black

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation
51 - 75 of 722 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement