IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 665 Matches Previous Page  |  Next Page
Protect Your Data at Every Point Possible
sponsored by Dell EMC and Intel®
RESOURCE: The average annual cost of data loss is nearly $1 million, according to Dell EMC research. Take a look at this infographic to uncover how to protect your data at every point possible in the shifting IT landscape.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

Dell EMC and Intel®

Protecting Your Distributed Data With The Cloud
sponsored by Druva Software
EBOOK: Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

Druva Software

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018


Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015


ASEAN IT Priorities 2018
sponsored by
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

7 Strategies for Better SCADA Data Protection
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Click inside to learn some reasons SCADA servers fail, as well as 7 steps you can take to enable regular, hardware-independent cloud backups to prevent downtime.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

StorageCraft Technology Corporation

Backing Up the Cloud: A Full Cloud Data Protection Guide
sponsored by StorageCraft Technology Corporation
WHITE PAPER: In this white paper, learn about the importance of cloud data protection, some of the top ways data is lost in SaaS platforms, backup options for cloud applications, and more. Then, explore what some major cloud providers are offering in the way of backup and data protection.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

StorageCraft Technology Corporation

Unlock Your Data and Accelerate Innovation
sponsored by TIBCO
WEBCAST: As data becomes a commodity, you'll need to learn how to get quick returns on your investments and embrace the algorithm economy. Listen to this webcast to learn how you can optimize your data and unveil hidden insights.
Posted: 12 Feb 2018 | Premiered: Feb 12, 2018


GDPR Compliance and Its Impact on Security and Data Protection Programs
sponsored by Forcepoint
RESEARCH CONTENT: The General Data Protection Regulation (GDPR) will require a whole new outlook on your data protection. Read this survey from Osterman Research and learn the basic requirements of GDPR compliance, what technologies will be needed to take you there, and more.
Posted: 31 Jan 2018 | Published: 31 Jan 2017


Building Your Data Loss Prevention Strategy and Process
sponsored by Forcepoint
WHITE PAPER: Use this guide to discover the 7 key points you need to understand as you organize your data loss prevention (DLP) project and roll out your DLP program at every phase of deployment.
Posted: 30 Jan 2018 | Published: 30 Jan 2018


Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017


DevOps GDPR Compliance: The Condensed Edition
sponsored by Sysdig
DATA SHEET: This article focuses on GDPR from the DevOps perspective, covering the key points, including an overview of regulations, the key terminology you'll see, and what's most important to your team.
Posted: 10 Jan 2018 | Published: 10 Jan 2018


FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Why Organizations Still Struggle To Digitally Transform & Innovate
sponsored by Veeam Software
WHITE PAPER: An overwhelming majority are struggling with availability and protection gaps, which are leading to data loss, impeded operating environments, and delayed digital transformation efforts. Access this report for survey results on how organizations struggle to bridge these gaps and ways you can cross them.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Veeam Software

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017


Why Data Protection Is the Cornerstone of Modern Enterprise Security
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.
Posted: 12 Oct 2017 | Published: 12 Oct 2017


Why Availability Beats Legacy Backup
sponsored by Veeam Software
WHITE PAPER: More than half of the world's largest companies have turned their back on legacy backup systems and made the move to availability. Here are the top ten reasons why organizations are making the switch.
Posted: 30 Aug 2017 | Published: 18 May 2017

Veeam Software

Why You Need to Include the Cloud in Your Disaster Recovery Plan
sponsored by StorageCraft Technology Corporation
RESOURCE: Oftentimes, onsite backups aren't enough to restore data loss. In this resource, you'll learn the role cloud backups should play in your DR plan. Access now to see how replicating to purpose-built cloud DR will allow you to flip a switch and failover to a secondary network running in the cloud in just minutes.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

StorageCraft Technology Corporation

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016


Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value
sponsored by Rubrik
WHITE PAPER: Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.
Posted: 26 Jun 2017 | Published: 26 Jun 2017


Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017


Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017


A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

1 - 25 of 665 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement