IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 480 Matches Previous Page  |  Next Page
How to Address the Top Five Human Threats to Your Data
sponsored by ALTR
WHITE PAPER: Data security threats seem to be everywhere and growing. Even the most hardened, off-the-grid security experts acknowledge that it is impossible to be 100% secure. Addressing top threats to your data is the first step in building a layered, data-centric approach to data security and privacy. Read on to learn how you can get started.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

ALTR

2018 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Verizon published its report on payment card security and compliance with the PCI DSS. Download the report now for a deep-dive into the specifics of what organizations find challenging about PCI DSS, the lessons learned from decades of dealing with compliance, and how to build a more sustainable security environment.
Posted: 22 May 2019 | Published: 22 May 2019

Verizon

TITUS Intelligent Protection
sponsored by TITUS
PRODUCT OVERVIEW: TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.
Posted: 17 May 2019 | Published: 17 May 2019

TITUS

TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018

TITUS

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

Data is on the Move
sponsored by Dell and Intel®
RESOURCE: Download this infographic for statistics on data security and employee efficiency from Forrester.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Dell and Intel®

On-Demand Data Storage in the Cloud
sponsored by ClearSky Data
VIDEO: The following discussion with CTO & Co-founder of ClearSky Data Laz Vekiarides will address the challenges and advantages associated with storing on-premises data in the cloud. The conversation also covers the need for secure and compliant data access. Join here.
Posted: 14 Dec 2018 | Premiered: 28 Aug 2018

ClearSky Data

Hammerspace Product Overview
sponsored by HammerSpace
WEBCAST: Join this webinar as David Flynn, CEO of Hammerspace, gives an overview of their Data-as-a-Service product for managing and accessing data in hybrid cloud environments. Some highlights include how Hammerspace breaks down hybrid and multi-cloud unstructured data silos.
Posted: 07 Dec 2018 | Premiered: Oct 17, 2018

HammerSpace

Data Archiving: Project Briefs
sponsored by Flatirons Digital Innovations
EBOOK: This 24-page collection of project briefs provides a snapshot of how to use archiving' tools to assist in decommissioning legacy systems. Read on for the challenges presented in each project, as well as the results and benefits of combining archiving and systems decommissioning initiatives.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Flatirons Digital Innovations

Ten Measures to Protect Your Organization from Ransomware
sponsored by Acronis
WHITE PAPER: Download this paper to learn ten simple measures you can use to proactively protect your organization from ransomware.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Acronis

Ransomware Mitigation with the Veeam Hyper-Availability Platform
sponsored by Veeam Software
ANALYST REPORT: To fend off the ransomware epidemic, IT teams need the ability to not only recover data reliably, but to prevent or mitigate attacks when possible by managing access controls. Download this ESG paper to view a backup platform that claims to do just that in its anti-ransomware measures.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Veeam Software

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Network DLP Buyer's Guide
sponsored by Fidelis
ESSENTIAL GUIDE: Download this DLP buyer's guide for everything your organization should be aware of when approving a Network DLP approach to meet modern day security challenges.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Fidelis

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Leading Legal Firm Implements the Fidelis Platform to Protect Clients From Advanced Attacks
sponsored by Fidelis
CASE STUDY: Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fidelis

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Data protection & compliance for Australian/New Zealand businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

Protect Your Data at Every Point Possible
sponsored by Dell EMC and Intel®
RESOURCE: The average annual cost of data loss is nearly $1 million, according to Dell EMC research. Take a look at this infographic to uncover how to protect your data at every point possible in the shifting IT landscape.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

Dell EMC and Intel®

Protecting Your Distributed Data With The Cloud
sponsored by Druva Software
EBOOK: Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

Druva Software

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

ASEAN IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

ComputerWeekly.com

Unlock Your Data and Accelerate Innovation
sponsored by TIBCO
WEBCAST: As data becomes a commodity, you'll need to learn how to get quick returns on your investments and embrace the algorithm economy. Listen to this webcast to learn how you can optimize your data and unveil hidden insights.
Posted: 12 Feb 2018 | Premiered: Feb 12, 2018

TIBCO

Best Practices for Data Backup and DR Planning in 2019
sponsored by New Cloud Networks
EGUIDE: In this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
Posted: 21 Dec 2018 | Published: 20 Dec 2018

New Cloud Networks
1 - 25 of 480 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement