IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
1 - 25 of 170 Matches Previous Page  |  Next Page
Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Your Best Defence Against Data Loss
sponsored by Webroot
WHITE PAPER: Cyber resilience means being able to stay up and running, even in the face of cyberattacks and data loss. Learn how you can get endpoint protection, network protection, security awareness training, and much more with Webroot and Carbonite.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Webroot

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Why Data Protection Matters for Today’s Multi-cloud Environments
sponsored by Dell Technologies
WHITE PAPER: Access this white paper to discover the benefits of optimized data protection for multi-cloud environments, like completing projects under budget and ahead of schedule, and how to get there.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Dell Technologies

Protecting Data From Cybercrime
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Checkout this white paper to learn how to formulate the optimal backup strategy against prominent cyber threats and discover why a tape air gap cannot be compromised, leading to the highest levels available of hardware data protection.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Fujifilm Recording Media USA, Inc.

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Data Protection Trends in Virtual Environments
sponsored by Dell Technologies and Intel
WHITE PAPER: Access this ESG white paper here to identify VM data protection challenges and trends and learn how Dell Technologies and VMware have joined together to alleviate your organization’s concerns.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Dell Technologies and Intel

Securing the Data Center in Just Four Steps
sponsored by VMware
WHITE PAPER: Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.
Posted: 28 Aug 2020 | Published: 30 Jun 2020

VMware

Enterprise Architect's Guide: Top 4 Strategies for Automating and Accelerating Your Data Pipeline
sponsored by Qlik
WHITE PAPER: How can you satisfy today’s real-time data requirements while keeping data traceable and governed? By taking advantage of four key strategies to automate and accelerate your end-to-end data pipeline. Download this eBook for an introduction to this topic.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Qlik

A New Approach to Disaster Recovery for a Modern Era
sponsored by Equinix
WHITE PAPER: Access this custom white paper to learn 11 ways you can update or even overhaul your disaster recovery plans to include a wide range of new capabilities in the work from home era and discover how Equinix can help.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Equinix

7 Archiving Pitfalls That Reduce Your Savings
sponsored by Komprise
WHITE PAPER: View this white paper to learn 7 common archiving pitfalls to avoid and discover standards-based transparent archiving, an archiving solution without the disruption.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Komprise

Why Data Growth is not a Storage Problem
sponsored by Komprise
WHITE PAPER: Read on to learn how analytics-driven data management can put you in control of your data for smarter decisions and maximum savings.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Komprise

The Ascent to Hyperscale
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: To manage massive data growth and long-term retention challenges, organizations are leveraging tape technology solutions. Access this white paper to learn how modern tape can fulfill the needs of the hyperscale data center, to view a case study on maximizing data protection efficiency, and to discover the 6 points to remember about modern tape.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Fujifilm Recording Media USA, Inc.

3 Overlooked Data Privacy Considerations
sponsored by Absolute Software Corporation
WHITE PAPER: This e-book explores what personal privacy means in a ‘dematerialized’ world and draws attention to 3 aspects of data protection that often go overlooked. Read on to learn more.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Absolute Software Corporation

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

6 Ways You can Improve Backup and Recovery
sponsored by VMware, Inc.
WHITE PAPER: Check out this resource to discover the huge number of benefits that can be gained from leveraging server virtualization.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

VMware, Inc.

Top 5 Reasons Customers Choose VMware vSphere Data Protection Advanced
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper examines the top 5 reasons companies are utilizing one single-vendor solution in particular to help meet their backup and recovery needs.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

VMware, Inc.

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data
1 - 25 of 170 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info