IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
26 - 50 of 472 Matches Previous Page  |  Next Page
How to Test Your Company’s Disaster Preparedness
sponsored by Ensono Limited
DATA SHEET: Companies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Ensono Limited

Why Data Growth is not a Storage Problem
sponsored by Komprise
WHITE PAPER: Read on to learn how analytics-driven data management can put you in control of your data for smarter decisions and maximum savings.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Komprise

5-min demo: Modernizing Backup
sponsored by Veeam Software
VIDEO: Access this video to discover how to re-use your backup data to drive rapid application development through virtual sandboxes and to view a demo of this solution.
Posted: 08 Jun 2020 | Premiered: 26 May 2020

Veeam Software

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 26 May 2020 | Published: 26 May 2020

ComputerWeekly.com

Introduction to Data Catalogs
sponsored by Alation
EBOOK: As you might expect, success with data cataloging requires a fundamental knowledge of data catalogs themselves. Dive into this e-book to learn the what and why of data cataloging, the role of data curation, how data catalogs are revolutionizing metadata management, and the importance of collaboration and crowdsourcing.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Alation

Game-Changing Storage Trends for the Year Ahead
sponsored by StorageCraft Technology Corporation
DATA SHEET: As companies today are generating virtual oceans worth of data, knowing what data is more critical to their success will help them better manage their storage and leverage insights from that data. Access this datasheet to learn 6 game-changing storage trends for the year ahead.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

StorageCraft Technology Corporation

Why Is A Data Archiving Plan Important?
sponsored by Beta Systems
EGUIDE: When paired with an over-arching data protection plan, a strong archiving strategy can provide storage capabilities that you can use over extended time frames and at a reduced cost. Access this e-guide to learn the 4-step process for setting up a data archival plan and to get briefed on the 6 incentives of having a plan in place.
Posted: 26 Mar 2020 | Published: 24 Mar 2020

Beta Systems

In Your Data Archive Strategy, How Long is Long Enough?
sponsored by Beta Systems
EGUIDE: It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Beta Systems

Machina Tools for Cloud Storage
sponsored by Ionic Security
DATA SHEET: A data security solution for multi-cloud storage should provide cross-cloud data security, automated incident responses, regulatory requirement tracking, and data security blind spot protection. Access this datasheet to explore a single interface multi-cloud solution that does all this while providing 3 key business benefits.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Ionic Security

Implementing Privacy Policy: Scaling Your Data Privacy Program
sponsored by Ionic Security
VIDEO: View this Ionic Security demo to see scalable and consistent data protection in action ⁠— through the lens of a custom HR app.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

The Ascent to Hyperscale
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: To manage massive data growth and long-term retention challenges, organizations are leveraging tape technology solutions. Access this white paper to learn how modern tape can fulfill the needs of the hyperscale data center, to view a case study on maximizing data protection efficiency, and to discover the 6 points to remember about modern tape.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Fujifilm Recording Media USA, Inc.

3 Overlooked Data Privacy Considerations
sponsored by Absolute Software Corporation
WHITE PAPER: This e-book explores what personal privacy means in a ‘dematerialized’ world and draws attention to 3 aspects of data protection that often go overlooked. Read on to learn more.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Absolute Software Corporation

Protect Your Data in Amazon S3: Product Overview
sponsored by Ionic Security
DATA SHEET: In this paper, learn Ionic Machina enables the management of your sharedresponsibility by securing your data in Amazon S3 .
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Ionic Security

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Data protection & compliance for Australian/New Zealand businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

ASEAN IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

ComputerWeekly.com

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

Best Practices for Data Backup and DR Planning in 2019
sponsored by New Cloud Networks
EGUIDE: In this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
Posted: 21 Dec 2018 | Published: 20 Dec 2018

New Cloud Networks

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

When Cyberthieves Attack, Technologies Have Your Back
sponsored by SearchHealthIT.com
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com
26 - 50 of 472 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info