IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP)Reports
51 - 75 of 703 Matches Previous Page  | Next Page
Protecting Data and Enabling the Mobile Enterprise
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores best practices for adopting and securing mobility in the workplace, as well as the importance of data protection.
Posted: 11 Feb 2014 | Published: 30 Jun 2012

Hewlett-Packard Limited

Computer Weekly buyer’s guide to Windows XP support
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Microsoft will end technical support for its Windows XP operating system in April 2014. Computer Weekly looks at what this means for those businesses that have yet to migrate to newer alternatives.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Take 6 steps to know that your data is safely stored
sponsored by Iron Mountain
WHITE PAPER: This informative workbook delves into key elements you need to master to ensure you know where your data is at any given time and where it is going. Read on now to discover five key steps for protecting your business data and get started.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

Iron Mountain

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

The Data Recovery Workbook
sponsored by Iron Mountain
WHITE PAPER: This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started!
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Iron Mountain

Backup and Recovery Requirements for Business-Critical Applications
sponsored by SearchStorage.com
EGUIDE: In this e-guide, learn strategies to determine what data is considered most important. Also, read about the different ways to select and establish an effective backup policy to ensure essential data is properly monitored.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

SearchStorage.com

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Retail Giant Completes Virtual, Storage Overhaul (And Lives to Tell About It)
sponsored by Dell, Inc.
CASE STUDY: This informative paper explores how one organization easily and affordably implemented these modern technologies to keep up in today's fast-paced and virtualized landscape. Read on to learn about the benefits they now enjoy.
Posted: 19 Nov 2013 | Published: 28 Jun 2013

Dell, Inc.

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

Top 10 Backup Challenges and Expert Recommendations to Address Them
sponsored by SearchStorage.com
EGUIDE: This e-guide reports today's top backup challenges companies are struggling to address and explains how erasure coding, object storage, and other innovative approaches can eliminate the need to restore, enabling instant recovery instead. Read on now to learn more.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

SearchStorage.com

Backup to the Cloud is Still Cloudy
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

ExaGrid Systems, Inc.

CIO Decisions E-Zine: The New BPM
sponsored by SearchCIO.com
EZINE: Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

SearchCIO.com

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

Enterprise Resiliency & Application Recovery
sponsored by SunGard Availability Services
WHITE PAPER: When disaster strikes, your IT information and data is compromised. This side-by-side case study outlines how East Coast University and a medical center in NYC helped weather hurricane sandy and maintain IT availability.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SunGard Availability Services

The Past, Present, and Future of RAID Data Protection
sponsored by SearchCloudStorage.com
ESSENTIAL GUIDE: In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.
Posted: 22 Nov 2013 | Published: 22 Nov 2013


For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Optimize Your Network with Dell and Silver Peak and Reap the Benefits
sponsored by Dell and Microsoft
WHITE PAPER: This informative paper explores a partnership that addresses today's consolidation, backup, replication and unified communications. Discover how this cost effectively increase network capacity, optimize network quality, and help ensure maximum performance over distance—all while helping to reduce ongoing IT operating costs. Read on to learn more.
Posted: 12 Nov 2013 | Published: 31 Jul 2013

Dell and Microsoft

Retailer stays number one with enhanced IT support
sponsored by Dell, Inc.
CASE STUDY: This informative paper explores how one organization easily and affordably implemented these modern technologies to keep up in today's fast-paced and virtualized landscape. Read on to learn about the benefits they now enjoy.
Posted: 11 Nov 2013 | Published: 28 Jun 2013

Dell, Inc.

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Why Upgrade to NetBackup 5230 and 5030 Appliances?
sponsored by DLT Solutions
WHITE PAPER: This informative resource examines a modernized backup approach with expandable storage and end-to-end data protection for physical and virtual environments. Read on to discover more.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

DLT Solutions

Symantec NetBackup Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by DLT Solutions
WHITE PAPER: This informative paper explores considerations to take into account when looking to modernize your backup and recovery initiatives. Read on to learn more.
Posted: 06 Nov 2013 | Published: 29 Mar 2013

DLT Solutions

What's New with Symantec NetBackup Appliances
sponsored by DLT Solutions
DATA SHEET: This informative paper examines what's new in the realm of backup appliances and explores how today's IT pros are changing the way they backup and recover virtual and physical environments. Read on now to learn more.
Posted: 05 Nov 2013 | Published: 31 May 2013

DLT Solutions
51 - 75 of 703 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement