IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 487 Matches Previous Page  |  Next Page
Designing and Building a Data Pipeline for Your AI Workflows
sponsored by NetApp
WHITE PAPER: This white paper discusses AI infrastructure challenges and how to support AI with careful planning. Access it here to find out if your infrastructure is ready to support AI workflows, how to accelerate I/O in a deep learning pipeline, and more.
Posted: 12 Mar 2019 | Published: 31 Mar 2018

NetApp

Data is on the Move
sponsored by Dell and Intel®
RESOURCE: Download this infographic for statistics on data security and employee efficiency from Forrester.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Dell and Intel®

Consumption-based Data Management Providing Peace of Mind
sponsored by Veeam Software
WEBCAST: This webcast introduces you to consumption-based data management, a model that eliminates the need for overprovisioning while assuring supply as business needs grow. Tune in to learn how it differs from the cloud and 3 advantages of this strategy.
Posted: 15 Feb 2019 | Premiered: Jan 22, 2019

Veeam Software

Do You Know Where your SaaS Data is Backed Up?
sponsored by AWS-NetApp
WHITE PAPER: Don't let unknown data loss threaten your business. Use this white paper to learn how to identify the gaps between your SaaS software and your backup and recovery needs.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

AWS-NetApp

Architecting Data Lakes: Data Management Architectures for Advances Business Use Cases
sponsored by Zaloni
EBOOK: This 57-page e-book illustrates how to successfully architect data lakes. Read on as chapters include information on designing your data lake, data ingestion and governance considerations, and how to derive value from deployment.
Posted: 05 Feb 2019 | Published: 31 Dec 2018

Zaloni

Integrated Security Analytics
sponsored by Forcepoint
WHITE PAPER: Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise makes the task of identifying genuine data theft risks challenging, even for well-resourced security operations teams. In this white paper, read about Forcepoint's integrated security analytics system.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

Forcepoint

Data Loss Prevention
sponsored by Forcepoint
: Learn how Data Loss Prevention vendors like Symantec, Forcepoint, McAfee, Digital Guardian, and more stack up to see which one is right for your organization.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

Forcepoint

On-Demand Data Storage in the Cloud
sponsored by ClearSky Data
VIDEO: The following discussion with CTO & Co-founder of ClearSky Data Laz Vekiarides will address the challenges and advantages associated with storing on-premises data in the cloud. The conversation also covers the need for secure and compliant data access. Join here.
Posted: 14 Dec 2018 | Premiered: 28 Aug 2018

ClearSky Data

How ClearSky Data Compares to Rubrik
sponsored by ClearSky Data
WHITE PAPER: Access this paper to see how competitive backup and DR vendor ClearSky Data compares to Rubrik. Inside you'll find a 12-point feature comparison, as well as a head-to-head breakdown of performance, physical footprint, scalability, cloud integration, and the cost of the two.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

ClearSky Data

Hammerspace Product Overview
sponsored by HammerSpace
WEBCAST: Join this webinar as David Flynn, CEO of Hammerspace, gives an overview of their Data-as-a-Service product for managing and accessing data in hybrid cloud environments. Some highlights include how Hammerspace breaks down hybrid and multi-cloud unstructured data silos.
Posted: 07 Dec 2018 | Premiered: Oct 17, 2018

HammerSpace

Data Archiving: Project Briefs
sponsored by Flatirons Digital Innovations
EBOOK: This 24-page collection of project briefs provides a snapshot of how to use archiving' tools to assist in decommissioning legacy systems. Read on for the challenges presented in each project, as well as the results and benefits of combining archiving and systems decommissioning initiatives.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Flatirons Digital Innovations

Large Volumes Do Change the Game for Data Protection
sponsored by Atempo, Inc.
VIDEO: Join the following webinar right now for several practices that will help you overcome the challenges associated with large-scale data migration between heterogeneous systems. Included is a case study discussion involving a company needing to move 1 petabyte of data from their NAS infrastructure to a Qumulo platform.
Posted: 26 Nov 2018 | Premiered: 20 Nov 2018

Atempo, Inc.

Migration Made Simple for Large File Volumes Between Storage Systems
sponsored by Atempo, Inc.
PRODUCT OVERVIEW: Download this paper for an approach with which you can rapidly and securely move data between heterogeneous storage systems (like NAS, distributed, or parallel file servers). This approach ensures minimal production downtime, automatic object integrity and file access checks, and complete support services.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Atempo, Inc.

Ten Measures to Protect Your Organization from Ransomware
sponsored by Acronis
WHITE PAPER: Download this paper to learn ten simple measures you can use to proactively protect your organization from ransomware.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Acronis

Ransomware Mitigation with the Veeam Hyper-Availability Platform
sponsored by Veeam Software
ANALYST REPORT: To fend off the ransomware epidemic, IT teams need the ability to not only recover data reliably, but to prevent or mitigate attacks when possible by managing access controls. Download this ESG paper to view a backup platform that claims to do just that in its anti-ransomware measures.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Veeam Software

Security for the Modern Worker
sponsored by Dell EMC
WHITE PAPER: Learn how employees can be empowered to work their way while protecting your company's data wherever it goes.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Dell EMC

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Network DLP Buyer's Guide
sponsored by Fidelis
ESSENTIAL GUIDE: Download this DLP buyer's guide for everything your organization should be aware of when approving a Network DLP approach to meet modern day security challenges.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Fidelis

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Leading Legal Firm Implements the Fidelis Platform to Protect Clients From Advanced Attacks
sponsored by Fidelis
CASE STUDY: Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fidelis

Advanced Data Protection Now Within Reach for Mid-Market Companies
sponsored by InteliSecure
WHITE PAPER: Robust security programs are more accessible, affordable, and capable than ever before, helping confront a deluge of new regulations and cyberthreats for mid-market companies, today. Download this white paper to see the real benefits of Managed Security Services.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

InteliSecure

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Quantifying Business Risk to Optimize Data Security
sponsored by InteliSecure
EBOOK: Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

InteliSecure

Best Practices for Data Backup and DR Planning in 2019
sponsored by New Cloud Networks
EGUIDE: In this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
Posted: 21 Dec 2018 | Published: 20 Dec 2018

New Cloud Networks
1 - 25 of 487 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement