IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) White Papers (View All Report Types)
1 - 25 of 174 Matches Previous Page  |  Next Page
Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

What’s Driving DRaaS Adoption?
sponsored by TierPoint
WHITE PAPER: Check out this white paper to learn 5 steps to navigating DRaaS adoption and 6 benefits it can deliver.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

TierPoint

Secure your Data, your Recovery, and your Mission
sponsored by Commvault
WHITE PAPER: Explore this white paper to examine major data backup concerns and how they can be addressed by Commvault as well as 5 recovery readiness capabilities that Commvault offers.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Commvault

Protecting Data From Cybercrime
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Checkout this white paper to learn how to formulate the optimal backup strategy against prominent cyber threats and discover why a tape air gap cannot be compromised, leading to the highest levels available of hardware data protection.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Fujifilm Recording Media USA, Inc.

Data Protection Trends for Financial Services, from Veeam
sponsored by Veeam Software
WHITE PAPER: Access this white paper to learn the results of a 217 financial service organization survey on data protection and management and discover what makes Veeam data backup and recovery a front runner.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

Veeam Software

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Data Protection Trends in Virtual Environments
sponsored by Dell Technologies and Intel
WHITE PAPER: Access this ESG white paper here to identify VM data protection challenges and trends and learn how Dell Technologies and VMware have joined together to alleviate your organization’s concerns.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Dell Technologies and Intel

Enterprise Backup for the Remote World: Are You Ready?
sponsored by Cobalt Iron
WHITE PAPER: Access this white paper to learn key data protection takeaways from the remote work experience and discover how Cobalt Iron Compass Enterprise SaaS can perfect backup in a remote world.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Cobalt Iron

Securing the Data Center in Just Four Steps
sponsored by VMware International Unlimited Company
WHITE PAPER: Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.
Posted: 28 Aug 2020 | Published: 30 Jun 2020

VMware International Unlimited Company

How data protection helps the changing CIO strategy
sponsored by Commvault
WHITE PAPER: Check out this e-book to discover how the COVID-19 pandemic is changing the role of the CIO, learn 5 data protection projects you can work on now to improve your overall data protection strategy, and more.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Commvault

Enterprise Architect's Guide: Top 4 Strategies for Automating and Accelerating Your Data Pipeline
sponsored by Qlik
WHITE PAPER: How can you satisfy today’s real-time data requirements while keeping data traceable and governed? By taking advantage of four key strategies to automate and accelerate your end-to-end data pipeline. Download this eBook for an introduction to this topic.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Qlik

Modern Backup Buyers' Guide
sponsored by Veeam Software
WHITE PAPER: Check out this Forrester Research white paper to learn the 6 attributes that organizations should consider as they look for the right data protection and data backup solution for today’s hybrid environments and discover the capabilities within each feature.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Veeam Software

Secure your data, your recovery and your mission
sponsored by Commvault
WHITE PAPER: Check out this white paper to discover 5 key backup and recovery concerns, learn how Commvault addresses them, and access cyber security recommendations for developing a multi-layer strategy.
Posted: 22 May 2020 | Published: 22 May 2020

Commvault

Disaster Recovery Waits for No One
sponsored by Commvault
WHITE PAPER: Whether your disaster is natural or man-made, how can you make sure your DR plan is ready? Access this resource to learn 4 steps to ensure your IT services are ready for action and that your data can be quickly put back where you need it to be.
Posted: 21 May 2020 | Published: 21 May 2020

Commvault

The Ascent to Hyperscale
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: To manage massive data growth and long-term retention challenges, organizations are leveraging tape technology solutions. Access this white paper to learn how modern tape can fulfill the needs of the hyperscale data center, to view a case study on maximizing data protection efficiency, and to discover the 6 points to remember about modern tape.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Fujifilm Recording Media USA, Inc.

Protecting NAS at Scale with Rubrik
sponsored by Rubrik
WHITE PAPER: Protecting this data requires a solution that is designed and built to protect terabytes to petabytes of unstructured data. Explore this e-book to learn about a three-phase approach to NAS protection that benefits users in a wide range of areas—capacity and scale among them—and which overcomes the drawbacks of NDMP.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Rubrik

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Why Laptop Security Cannot Wait
sponsored by Commvault
WHITE PAPER: This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.
Posted: 04 Dec 2015 | Published: 02 Dec 2015

Commvault

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

6 Ways You can Improve Backup and Recovery
sponsored by VMware, Inc.
WHITE PAPER: Check out this resource to discover the huge number of benefits that can be gained from leveraging server virtualization.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

VMware, Inc.

Top 5 Reasons Customers Choose VMware vSphere Data Protection Advanced
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper examines the top 5 reasons companies are utilizing one single-vendor solution in particular to help meet their backup and recovery needs.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

VMware, Inc.

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security
1 - 25 of 174 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info