IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 659 Matches Previous Page  |  Next Page
How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

Data protection & compliance for Australian/New Zealand businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

Protecting Your Distributed Data With The Cloud
sponsored by Druva Software
EBOOK: Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

Druva Software

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

ASEAN IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

ComputerWeekly.com

7 Strategies for Better SCADA Data Protection
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Click inside to learn some reasons SCADA servers fail, as well as 7 steps you can take to enable regular, hardware-independent cloud backups to prevent downtime.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

StorageCraft Technology Corporation

Backing Up the Cloud: A Full Cloud Data Protection Guide
sponsored by StorageCraft Technology Corporation
WHITE PAPER: In this white paper, learn about the importance of cloud data protection, some of the top ways data is lost in SaaS platforms, backup options for cloud applications, and more. Then, explore what some major cloud providers are offering in the way of backup and data protection.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

StorageCraft Technology Corporation

Unlock Your Data and Accelerate Innovation
sponsored by TIBCO
WEBCAST: As data becomes a commodity, you'll need to learn how to get quick returns on your investments and embrace the algorithm economy. Listen to this webcast to learn how you can optimize your data and unveil hidden insights.
Posted: 12 Feb 2018 | Premiered: Feb 12, 2018

TIBCO

DevOps GDPR Compliance: The Condensed Edition
sponsored by Sysdig
DATA SHEET: This article focuses on GDPR from the DevOps perspective, covering the key points, including an overview of regulations, the key terminology you'll see, and what's most important to your team.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Sysdig

Why Availability Beats Legacy Backup
sponsored by Veeam Software
WHITE PAPER: More than half of the world's largest companies have turned their back on legacy backup systems and made the move to availability. Here are the top ten reasons why organizations are making the switch.
Posted: 30 Aug 2017 | Published: 18 May 2017

Veeam Software

Why You Need to Include the Cloud in Your Disaster Recovery Plan
sponsored by StorageCraft Technology Corporation
RESOURCE: Oftentimes, onsite backups aren't enough to restore data loss. In this resource, you'll learn the role cloud backups should play in your DR plan. Access now to see how replicating to purpose-built cloud DR will allow you to flip a switch and failover to a secondary network running in the cloud in just minutes.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

StorageCraft Technology Corporation

Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value
sponsored by Rubrik
WHITE PAPER: Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Rubrik

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

When Cyberthieves Attack, Technologies Have Your Back
sponsored by SearchHealthIT.com
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM
1 - 25 of 659 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement