IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
1 - 25 of 575 Matches Previous Page  |  Next Page
Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Data Protection Trends for Financial Services, from Veeam
sponsored by Veeam Software
WHITE PAPER: Access this white paper to learn the results of a 217 financial service organization survey on data protection and management and discover what makes Veeam data backup and recovery a front runner.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

Veeam Software

Accelerate App Delivery on AWS with Rubrik
sponsored by Rubrik
WHITE PAPER: With Rubrik Cloud Data Management, organizations will have a solution built specifically for AWS. Access this white paper to learn 4 key benefits that Rubrik brings to the table and discover exactly how it works.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Rubrik

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

The Power of Tokenization for Protecting Sensitive Data
sponsored by Thales
WHITE PAPER: For protecting sensitive data, there are many security options to choose from. Tokenization is not yet a popular choice, but it may serve organizations well in fending off threat actors. Sensitive data is replaced with a non-sensitive equivalent, known as a token, that has no exploitable meaning or value. Dig into this white paper to learn more.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

Druva Data Protection for VMware Cloud on AWS
sponsored by Druva
WHITE PAPER: Access this white paper to see how Druva’s cloud platform transforms data protection throughout endpoints, data centers, and hybrid cloud environments and discover 4 benefits it offers across any AWS region.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Druva

Insider’s Guide to Defending Against Ransomware
sponsored by Druva
WHITE PAPER: Access this white paper to learn about the real cost of ransomware, why the best offense is a good defense, and how a powerful ransomware recovery solution can make all the difference in the world.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Druva

Data Protection Trends in Virtual Environments
sponsored by Dell Technologies and Intel
WHITE PAPER: Access this ESG white paper here to identify VM data protection challenges and trends and learn how Dell Technologies and VMware have joined together to alleviate your organization’s concerns.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Dell Technologies and Intel

Proofpoint CASB Adaptive Access Controls
sponsored by Proofpoint
DATA SHEET: Cloud-based networking has enabled never-before-seen flexibility, but the vulnerability of the cloud and the now-widespread use of unmanaged devices has driven security risk through the roof. A CASB is a viable option to help mitigate this risk. Browse this solution brief to understand the technology behind CASB and why it is gaining popularity.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Proofpoint

Advizex Saved this Global Powerhouse
sponsored by Advizex
CASE STUDY: Access this white paper to learn about the evolving threat of ransomware, how a disaster recovery strategy can prepare your organization for an attack, and how Advizex can help.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Advizex

Apex One Datasheet
sponsored by Trend Micro
DATA SHEET: The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

Enterprise Backup for the Remote World: Are You Ready?
sponsored by Cobalt Iron
WHITE PAPER: Access this white paper to learn key data protection takeaways from the remote work experience and discover how Cobalt Iron Compass Enterprise SaaS can perfect backup in a remote world.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Cobalt Iron

Complete Data Protection of Office 365 with Commvault
sponsored by Commvault
VIDEO: Access this video to discover why data protection for Office 365 from Commvault is more than just mailbox protection, including 4 key services it can provide your organization.
Posted: 31 Aug 2020 | Premiered: 02 Aug 2019

Commvault

Securing the Data Center in Just Four Steps
sponsored by VMware
WHITE PAPER: Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.
Posted: 28 Aug 2020 | Published: 30 Jun 2020

VMware

How Homegrown Analytics Can Fragment Your Data Story
sponsored by LogiAnalytics
WEBCAST: Join Mico Yuk, CEO of BI Brainz, for this webinar, as she explains how to embrace the power of true data storytelling, the four parts of a compelling data story, and how an analytics platform can simplify your data story and allow you to focus on UX.
Posted: 28 Aug 2020 | Premiered: Aug 28, 2020

LogiAnalytics

Breaking the Latency Floor: Data Access at the Speed of Thought
sponsored by Molecula
EBOOK: Delivering vast historical data sets or extensive volumes of streaming data stored across multiple silos and geographies in real time with minimal to no latency is a big ask—but this e-book can help you get there. Download now to view 4 latency-reduction strategies.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Molecula

Why You Need Data Virtualization
sponsored by TIBCO
VIDEO: Tune into this video to learn about TIBCO’s data virtualization and how it can empower your team and users to access data across the network and query it as if it was centrally located.
Posted: 27 Aug 2020 | Premiered: 27 Aug 2020

TIBCO

Buyer's Checklist for Microsoft Office 365 Data Protection
sponsored by Commvault
RESOURCE: Access this checklist from Commvault to evaluate your Office 365 data protection strategy against 5 criteria to find differences, gaps in coverage, or confirmation that you have a complete strategy in place.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Commvault

The Periodic Table of Data Protection
sponsored by Dell Technologies & Intel®
EBOOK: Based on today's increasing threats to data integrity on a number of fronts, the topic of data protection is a primary concern. View this comprehensive e-book to navigate the complexities of enterprise data protection and to view all the options you have at your disposal.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Dell Technologies & Intel®

How data protection helps the changing CIO strategy
sponsored by Commvault
WHITE PAPER: Check out this e-book to discover how the COVID-19 pandemic is changing the role of the CIO, learn 5 data protection projects you can work on now to improve your overall data protection strategy, and more.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Commvault

A Checklist for Multi-cloud Data Management
sponsored by Commvault
RESOURCE: In this data sheet, find a checklist to evaluate your current backup and recovery products to quickly identify differences in modern data protection, find gaps in coverage, and learn new ways to simplify your multi-cloud data protection.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Commvault

Complete Data Protection Across Cloud and On-premises Environments
sponsored by Commvault
DATA SHEET: Check out this data sheet to learn the top challenges that IT leaders face today and how Commvault addresses them, modern data protection requirements and how Commvault meets them, and the top 5 features of Commvault’s data management platform.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Commvault

Realize True Hybrid Cloud
sponsored by Pure Storage
DATA SHEET: Check out this data sheet to learn 6 benefits of Pure Storage cloud data services that will help you run mission-critical applications seamlessly in the cloud while providing hybrid mobility, protection, and seamless management and orchestration across environments.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Pure Storage

Protect Your Data from Ransomware with Commvault and Cloudian
sponsored by Cloudian
DATA SHEET: With Cloudian HyperStore enterprise storage combined with Commvault Complete Backup & Recovery software, the duo provides organizations with seamless ransomware protection at 70% less cost. Check out this data sheet to learn 7 key benefits that distinguish Cloudian & Commvault from other backup and recovery options.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Cloudian

e-book: Remote Workforce Security
sponsored by Dtex
EBOOK: Did you know that there’s a 78% increase in accidental data loss when employees work from home? Tap into this e-book to reveal more statistics like this and 3 ways your company can stay protected during this WFH era.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Dtex
1 - 25 of 575 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info