Data Loss Prevention (DLP) Reports

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT.
sponsored by dataguise, Inc.
WHITE PAPER: Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more.
Posted: 01 Jun 2010 | Published: 01 Jun 2010

dataguise, Inc.

Solving Four Primary Security Challenges of Microsoft SharePoint
sponsored by Sophos UK
WHITE PAPER: This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009

Sophos UK

IDC White Paper: Effective Information Security
sponsored by CA (India) Technologies Pvt. Ltd
ANALYST REPORT: Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Posted: 29 Apr 2010 | Published: 25 Sep 2009

CA (India) Technologies Pvt. Ltd

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
sponsored by TechTarget Health IT
EBOOK: Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

TechTarget Health IT

Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER: Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Linoma Software

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Information Security Magazine - February 2010: Under Control
sponsored by Information Security Magazine
EZINE: Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Information Security Magazine

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Lumension® Device Control for Microsoft® System Center
sponsored by Lumension
DATA SHEET: Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
Posted: 21 Jan 2010 | Published: 21 Jan 2010

Lumension

Next Generation Data Protection Solutions
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: This paper compares traditional data protection options and provides an overview of the impact data deduplication is having on the storage industry. Deduplication is quickly gaining momentum in the growing disk-to-disk backup market and offers several significant improvements over traditional data protection methods.
Posted: 14 Jan 2010 | Published: 14 Jan 2010

EMC Backup and Recovery Solutions

You’re Not As Backed Up As You Think
sponsored by EMC Corporation
WHITE PAPER: Learn how to overcome the challenges of traditional data backup for your small to mid-size organization and discover the benefits of implementing a Software-As-A-Service (SaaS) backup solution.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

EMC Corporation

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities
sponsored by Sophos
PRESENTATION TRANSCRIPT: Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

Sophos

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett Packard Enterprise
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett Packard Enterprise

E-Book: Data loss prevention strategies, practices and tools
sponsored by TechTarget Security
EBOOK: Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
Posted: 18 Nov 2009 | Published: 18 Nov 2009

TechTarget Security

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
sponsored by Imperva
PRESENTATION TRANSCRIPT: Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Published: 12 Nov 2009

Imperva

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
Posted: 12 Nov 2009 | Published: 12 Oct 2009

Imperva

Data Loss Prevention 2.0: Preventing the loss of confidential information via webmail, Facebook, wikis and blogs
sponsored by Code Green Networks, Inc.
WHITE PAPER: In today’s technology rich environment organizations are finding employees often post sensitive company information to insecure or public Internet sites using Web 2.0 applications. Code Green Networks TrueDLP provides organizations with a complete data loss prevention solution to stop the loss or theft of confidential or proprietary information.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Code Green Networks, Inc.

Data Deduplication – Different Approaches for Different Environments
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: There are so many different types of deduplication: source, target, hash-based, delta differential-based, and global dedupe, for example. Read this presentation transcript for a discussion of data backup methods, data security, and data storage strategies for various environments.
Posted: 29 Oct 2009 | Published: 26 Oct 2009

Hewlett Packard Enterprise

Presentation Transcript: Business Case for Data Protection Survey & Results
sponsored by Ounce Labs, an IBM Company
PRESENTATION TRANSCRIPT: This presentation transcript presents the results of a survey conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company. The survey determines what senior executives think about the value proposition of corporate data protection efforts. Read on to learn more.
Posted: 28 Oct 2009 | Published: 21 Oct 2009

Ounce Labs, an IBM Company

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Presentation Transcript: MS SQL Server 2008
sponsored by Fusion-IO
PRESENTATION TRANSCRIPT: Check out this transcript of a presentation given by Sumeet Bansal, Fusion-io Principal Solutions Architect, to learn how Fusion-io solutions enhance SQL server performance, improve customer experience, and optimize storage management systems.
Posted: 12 Oct 2009 | Published: 30 Sep 2009

Fusion-IO

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss