IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 468 Matches Previous Page  |  Next Page
A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

Beat Ransomware: Education, Implementation And Remediation With Veeam
sponsored by Veeam Software
EBOOK: Access this e-book from Veeam to learn tips from ransomware survivors on how to prevent an attack or recover quicker and discover the 3 strategies you can use to ensure you have the resiliency you need to avoid data loss, financial loss, business reputation damage, and more.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Veeam Software

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Leading Operator of Mexican Hypermarkets Achieves PCI-DSS Compliance
sponsored by Comforte AG
BROCHURE: A leading Mexican hypermarket operator needed to achieve PCI-DSS compliance in order to remain operational. They wanted to do so while implementing robust security for protection for data at rest within their enterprise systems. View this case study to see how Comforte AG was able to help maintain compliance and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

ComputerWeekly.com

Data protection for remote workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

If You Think You Can’t Afford to Protect Office 365, Think Again.
sponsored by arcserve
DATA SHEET: 56% of businesses use Office 365, yet most leave themselves wide open to cyberattacks and data loss without third-party protection. Why? Many assume Microsoft is backing up their data, but it’s actually up to you – the user – to protect from the unknown. So how can you start? Examine this data sheet to see a good first step.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Protecting Data From Cybercrime
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Checkout this white paper to learn how to formulate the optimal backup strategy against prominent cyber threats and discover why a tape air gap cannot be compromised, leading to the highest levels available of hardware data protection.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Fujifilm Recording Media USA, Inc.

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Data Protection Trends in Virtual Environments
sponsored by Dell Technologies and Intel
WHITE PAPER: Access this ESG white paper here to identify VM data protection challenges and trends and learn how Dell Technologies and VMware have joined together to alleviate your organization’s concerns.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Dell Technologies and Intel

Advizex Saved this Global Powerhouse
sponsored by Advizex
CASE STUDY: Access this white paper to learn about the evolving threat of ransomware, how a disaster recovery strategy can prepare your organization for an attack, and how Advizex can help.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Advizex

Why you Need DV
sponsored by TIBCO
VIDEO: Tune into this video to learn about TIBCO’s data virtualization and how it can empower your team and users to access data across the network and query it as if it was centrally located.
Posted: 27 Aug 2020 | Premiered: 27 Aug 2020

TIBCO

Enterprise Architect's Guide: Top 4 Strategies for Automating and Accelerating Your Data Pipeline
sponsored by Qlik
WHITE PAPER: How can you satisfy today’s real-time data requirements while keeping data traceable and governed? By taking advantage of four key strategies to automate and accelerate your end-to-end data pipeline. Download this eBook for an introduction to this topic.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Qlik

A New Approach to Disaster Recovery for a New Era
sponsored by Equinix
WHITE PAPER: Access this custom white paper to learn 11 ways you can update or even overhaul your disaster recovery plans to include a wide range of new capabilities in the work from home era and discover how Equinix can help.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Equinix

Thales Adds Data Discovery
sponsored by Thales
ANALYST REPORT: In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Thales

3 Ways Modern Backup Supports Your Business During Uncertain Times
sponsored by Cohesity
DATA SHEET: With data volume continuing to grow, a simple and secure modern backup solution can help boost your organizational preparedness while supporting your IT efficiency, data recovery, and compliance goals. Access this data sheet to learn 3 ways modern backup can support your specific business during uncertain times.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cohesity

How to Test Your Company’s Disaster Preparedness
sponsored by Ensono Limited
DATA SHEET: Companies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Ensono Limited

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 26 May 2020 | Published: 26 May 2020

ComputerWeekly.com

Defense In Depth with Rubrik Polaris Radar
sponsored by Rubrik
EBOOK: Access this e-book to learn about Polaris Radar from Rubrik, a SaaS platform that accelerates recovery from ransomware with minimal business disruption and data loss.
Posted: 07 May 2020 | Published: 07 May 2020

Rubrik

Introduction to Data Catalogs
sponsored by Alation
EBOOK: As you might expect, success with data cataloging requires a fundamental knowledge of data catalogs themselves. Dive into this e-book to learn the what and why of data cataloging, the role of data curation, how data catalogs are revolutionizing metadata management, and the importance of collaboration and crowdsourcing.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Alation

Why Is A Data Archiving Plan Important?
sponsored by Beta Systems
EGUIDE: When paired with an over-arching data protection plan, a strong archiving strategy can provide storage capabilities that you can use over extended time frames and at a reduced cost. Access this e-guide to learn the 4-step process for setting up a data archival plan and to get briefed on the 6 incentives of having a plan in place.
Posted: 26 Mar 2020 | Published: 24 Mar 2020

Beta Systems

Breaking Down Industry Leading Data Protection Vendors & Options
sponsored by SearchDataBackup.com
EBOOK: Read this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

SearchDataBackup.com

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella
1 - 25 of 468 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences