IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
51 - 75 of 787 Matches Previous Page  |  Next Page
ShareFile Enterprise Security White Paper
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Secure Pipes: Changing the Expectation of Your Internet Service Providers
sponsored by Level 3 Communications, Inc.
ANALYST BRIEF: The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century.
Posted: 09 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

IBM Guardium: Database security tool overview
sponsored by IBM
EGUIDE: This e-guide shows you a proven security system that offers real-time, policy-based monitoring of database activities, including privileged user actions. Access now to learn how you can predefine security policies and put in place triggers alerts when sensitive data is accessed, and block if necessary.
Posted: 06 May 2016 | Published: 03 May 2016

IBM

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Four enterprise scenarios for deploying database security tools
sponsored by IBM
EGUIDE: This e-guide shows you some classic use cases and how organizations are using security add-ons to boost database security. Learn the real benefits and challenges in selecting the right database security software to address the issues your organization faces.
Posted: 04 May 2016 | Published: 03 May 2016

IBM

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

Customer Story: Kuwait Petroleum Corporation
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Designing an Adaptive Security Architecture for Protection From Advanced Attacks
sponsored by Intel Security
ANALYST REPORT: Let Gartner show you how to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to "always on" monitoring to better protect your network when perimeter defenses fail.
Posted: 04 May 2016 | Published: 12 Feb 2014

Intel Security

It’s Time to Get Real With SDN and NFV
sponsored by Accelerated Concepts
WHITE PAPER: This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.
Posted: 04 May 2016 | Published: 01 Apr 2016

Accelerated Concepts

Advanced Threats: Integrating a Sandbox into your Infrastructure
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper offers you the ultimate combination of proactive mitigation, visibility and rich reporting. Access now to learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Data Breach Investigation Report
sponsored by Verizon
RESOURCE: This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.
Posted: 03 May 2016 | Published: 03 May 2016

Verizon

Email Threats: Key features of an email gateway security solution
sponsored by LogicNow
WHITE PAPER: What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.
Posted: 02 May 2016 | Published: 01 Apr 2016

LogicNow

Global IT Security Risks Survey Report
sponsored by Kaspersky Lab
WHITE PAPER: This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

What Is the Cost of One More Test?
sponsored by Ixia
WHITE PAPER: This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.
Posted: 02 May 2016 | Published: 01 Apr 2016

Ixia

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint
51 - 75 of 787 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement