IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 479 Matches Previous Page  |  Next Page
Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Your Best Defence Against Data Loss
sponsored by Webroot
WHITE PAPER: Cyber resilience means being able to stay up and running, even in the face of cyberattacks and data loss. Learn how you can get endpoint protection, network protection, security awareness training, and much more with Webroot and Carbonite.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Webroot

A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

Beat Ransomware: Education, Implementation And Remediation With Veeam
sponsored by Veeam Software
EBOOK: Access this e-book from Veeam to learn tips from ransomware survivors on how to prevent an attack or recover quicker and discover the 3 strategies you can use to ensure you have the resiliency you need to avoid data loss, financial loss, business reputation damage, and more.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Veeam Software

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Leading Operator of Mexican Hypermarkets Achieves PCI-DSS Compliance
sponsored by Comforte AG
BROCHURE: A leading Mexican hypermarket operator needed to achieve PCI-DSS compliance in order to remain operational. They wanted to do so while implementing robust security for protection for data at rest within their enterprise systems. View this case study to see how Comforte AG was able to help maintain compliance and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

ComputerWeekly.com

If You Think You Can’t Afford to Protect Office 365, Think Again.
sponsored by arcserve
DATA SHEET: 56% of businesses use Office 365, yet most leave themselves wide open to cyberattacks and data loss without third-party protection. Why? Many assume Microsoft is backing up their data, but it’s actually up to you – the user – to protect from the unknown. So how can you start? Examine this data sheet to see a good first step.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Protecting Data From Cybercrime
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Checkout this white paper to learn how to formulate the optimal backup strategy against prominent cyber threats and discover why a tape air gap cannot be compromised, leading to the highest levels available of hardware data protection.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Fujifilm Recording Media USA, Inc.

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Data Protection Trends in Virtual Environments
sponsored by Dell Technologies and Intel
WHITE PAPER: Access this ESG white paper here to identify VM data protection challenges and trends and learn how Dell Technologies and VMware have joined together to alleviate your organization’s concerns.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Dell Technologies and Intel

Advizex Saved this Global Powerhouse
sponsored by Advizex
CASE STUDY: Access this white paper to learn about the evolving threat of ransomware, how a disaster recovery strategy can prepare your organization for an attack, and how Advizex can help.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Advizex

Why you Need DV
sponsored by TIBCO
VIDEO: Tune into this video to learn about TIBCO’s data virtualization and how it can empower your team and users to access data across the network and query it as if it was centrally located.
Posted: 27 Aug 2020 | Premiered: 27 Aug 2020

TIBCO

Realize True Hybrid Cloud
sponsored by Pure Storage
DATA SHEET: Check out this data sheet to learn 6 benefits of Pure Storage cloud data services that will help you run mission-critical applications seamlessly in the cloud while providing hybrid mobility, protection, and seamless management and orchestration across environments.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Pure Storage

Enterprise Architect's Guide: Top 4 Strategies for Automating and Accelerating Your Data Pipeline
sponsored by Qlik
WHITE PAPER: How can you satisfy today’s real-time data requirements while keeping data traceable and governed? By taking advantage of four key strategies to automate and accelerate your end-to-end data pipeline. Download this eBook for an introduction to this topic.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Qlik

A New Approach to Disaster Recovery for a Modern Era
sponsored by Equinix
WHITE PAPER: Access this custom white paper to learn 11 ways you can update or even overhaul your disaster recovery plans to include a wide range of new capabilities in the work from home era and discover how Equinix can help.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Equinix

Eliminating the Weakest Link
sponsored by Iron Mountain
WEBCAST: Access this webcast to hear two solution experts from Iron Mountain discuss the backup challenges associated with working remote, the new business continuity landscape, where organizational priorities should lie, and the future for remote workforces.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Iron Mountain

DATA RESTORATION AND MIGRATION SERVICES
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn 4 things to look for in a restoration and migration services provider and discover why Iron Mountain may have the solution you’ve been looking for.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Iron Mountain

7 Archiving Pitfalls That Reduce Your Savings
sponsored by Komprise
WHITE PAPER: View this white paper to learn 7 common archiving pitfalls to avoid and discover standards-based transparent archiving, an archiving solution without the disruption.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Komprise

The Only 100% Opex Solution for Veeam Backup
sponsored by Zadara Storage
DATA SHEET: Access this data sheet to learn how you can protect your data from ever-present threats like technology failures, natural disasters, and rogue employees with 6 key benefits of Zadara.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Zadara Storage

Real World SD-WAN from MTM Technologies + CISCO (Asia Story)
sponsored by MTM Technologies
VIDEO: It is no longer a secret that organizations with a global reach can benefit from SD-WAN. SD-WAN optimizes traffic and improves data-loss prevention so that IT departments can put time into more productive areas.This brief video details the story of an organization that saved an average of 64% on MPLS bandwidth costs per site with SD-WAN.
Posted: 10 Jul 2020 | Premiered: 29 Apr 2020

MTM Technologies

Thales Adds Data Discovery
sponsored by Thales
ANALYST REPORT: In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Thales

Leverage your data
sponsored by Talend
ANALYST REPORT: It is taken for granted that companies should have a data governance strategy, but often the scope of an effective approach and who is affected by it are much less certain. Download the following study by BARC for the answers to popular governance questions and to learn how build a strong strategy.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Talend

Breaking Down Industry Leading Data Protection Vendors & Options
sponsored by SearchDataBackup.com
EBOOK: Read this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

SearchDataBackup.com
1 - 25 of 479 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences