IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
51 - 75 of 659 Matches Previous Page  |  Next Page
The Security Performance of 6 Key Industries
sponsored by BitSight
WHITE PAPER: Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Overcome Office 365 Security and Archiving Challenges
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augment your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Preserving Agility with Data Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: This white paper highlights a cloud-based data management solution that can deliver enterprise-grade protection, while not only preserving your organization's current agility but also extending it to backup and disaster recovery operations. Read on here to key into how to ensure business continuity via a hybrid cloud.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Commvault

Data Breach Readiness 2.0
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

ComputerWeekly.com

High Availability is not a Luxury: How to Eliminate Downtime
sponsored by arcserve
WHITE PAPER: It's time for another "get real" moment. What you do in terms of disaster recovery and business continuity planning matters to your organization...a lot. Yet many organizations choose to ignore the challenge. Don't ignore it. Review this analysis to get a better understanding of how you can eliminate application downtime.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

arcserve

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

Understanding Cloud Security: The AWS Shared Responsibility Model
sponsored by Alert Logic
RESOURCE: This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.
Posted: 22 Feb 2016 | Published: 27 Jan 2016

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell, Inc. and Intel®

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Microsoft and Citrix
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology

Bolster Your DLP Systems for Safer File Sharing and Collaboration
sponsored by FinalCode
EGUIDE: In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

FinalCode

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Linking Resiliency to Business Objectives: How To Make a Case For Corporate Investment
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM
51 - 75 of 659 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement