IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
76 - 100 of 726 Matches Previous Page  |  Next Page
Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016


How to Evaluate Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015


Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015


Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016


Create a Solid Incident Response Plan and Respond to Threats Efficiently
sponsored by Dell SecureWorks
EGUIDE: In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Dell SecureWorks

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016


Realize the value of data protection at scale
sponsored by HGST
WHITE PAPER: In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.
Posted: 31 Mar 2016 | Published: 01 Jan 2016


Today's Most Valuable Commodity is Located in Cyberspace
sponsored by Digital Guardian
EGUIDE: This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

An IT Pro’s Guide to Protecting Virtualized Data
sponsored by arcserve
WEBCAST: Watch this on-demand webcast and learn what all IT pros who are responsible for virtual servers need to know about protecting data in the modern world of virtualization.
Posted: 17 Mar 2016 | Premiered: Nov 30, 2015


Vendor Comparison: Intrusion Prevention Systems (IPS )
sponsored by IBM
TECHNICAL ARTICLE: This report by Gartner compares intrusion prevention systems (IPSs) in the market today. Uncover the strengths and cautions of the leaders, challengers, niche players, and visionaries.
Posted: 11 Mar 2016 | Published: 16 Nov 2015


Next-Generation Endpoint Security for Dummies
sponsored by Carbon Black
EBOOK: This e-book explains how all organizations are targeted in today's advanced threat environment. Discover how endpoints can serve as vulnerabilities to adversaries seeking to exploit your enterprise.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Carbon Black

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015


Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 24 Feb 2016 | Published: 15 Dec 2015


Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016


Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015


Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by
EZINE: In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016


Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise
sponsored by IBM
WHITE PAPER: This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.
Posted: 08 Mar 2016 | Published: 31 Dec 2015


Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016


Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016


Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic
76 - 100 of 726 Matches Previous Page    2 3 4 5 6 7    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement