IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
51 - 75 of 556 Matches Previous Page  |  Next Page
5-min demo: Modernizing Backup
sponsored by Veeam Software
VIDEO: With Cloud Data Management from Veeam, organizations can achieve substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup, and recovery teams. Access this video to discover how to re-use your backup data to drive rapid application development through virtual sandboxes.
Posted: 08 Jun 2020 | Premiered: 26 May 2020

Veeam Software

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Customer Reference Book HPE + Veeam
sponsored by Veeam Software
EBOOK: Legacy backup has been proven to slow down processes and limit data recovery capabilities. Access this e-book to learn about data availability and protection from HPE + Veeam built for hybrid environments, which leverages on-premises, virtual, and cloud platforms to fulfill each workload’s needs.
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Veeam Software

Drive Analytics into Clinical Care with Trusted Data
sponsored by Syniti
PRODUCT OVERVIEW: When it comes to data collection, storage, and management, the struggles of the healthcare industry are unique. See how Syniti helps healthcare organizations meet these challenges everyday in this solution brief.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

Syniti

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 26 May 2020 | Published: 26 May 2020

ComputerWeekly.com

Secure your data, your recovery and your mission
sponsored by Commvault
WHITE PAPER: Check out this white paper to discover 5 key backup and recovery concerns, learn how Commvault addresses them, and access cyber security recommendations for developing a multi-layer strategy.
Posted: 22 May 2020 | Published: 22 May 2020

Commvault

Disaster Recovery Waits for No One
sponsored by Commvault
WHITE PAPER: Whether your disaster is natural or man-made, how can you make sure your DR plan is ready? Access this resource to learn 4 steps to ensure your IT services are ready for action and that your data can be quickly put back where you need it to be.
Posted: 21 May 2020 | Published: 21 May 2020

Commvault

Commvault Complete™ Backup & Recovery datasheet
sponsored by Commvault
DATA SHEET: Check out this data sheet to discover 5 key questions to ask of your backup and recovery solution and discover one platform that provides everything you need to conduct backup, recovery and archiving activities, enable operational reporting, and perform hardware snapshot management.
Posted: 21 May 2020 | Published: 21 May 2020

Commvault

COVID-19 Related Data Security Threats
sponsored by Trend Micro
RESOURCE: The global health crisis is dangerous enough as it is which makes the added concern of cyber threats almost overwhelming. Access this resource from Trend Micro to learn what they have observed from studying this type of attack in order to explain how to effectively fight back against them.
Posted: 20 May 2020 | Published: 20 May 2020

Trend Micro

Case Study: The University of Melbourne
sponsored by Commvault
CASE STUDY: With this volume of data growing at a breakneck pace, the University of Melbourne needed centralized critical data protection, reduced complexity, and increased scalability. Access this case study to learn how Commvault Complete Backup & Recovery was able to meet this demand and discover the 4 major benefits it yielded for the university.
Posted: 20 May 2020 | Published: 20 May 2020

Commvault

Defense In Depth with Rubrik Polaris Radar
sponsored by Rubrik
EBOOK: Access this e-book to learn about Polaris Radar from Rubrik, a SaaS platform that accelerates recovery from ransomware with minimal business disruption and data loss.
Posted: 07 May 2020 | Published: 07 May 2020

Rubrik

Leadership at Times of Crisis
sponsored by EverBridge Inc.
WHITE PAPER: If you don’t have the right leadership or plan, crisis scenarios can be a truly daunting experience that could jeopardize your company’s livelihood. Check out this white paper from Everbridge for some reference points on how to lead during a crisis, which includes 7 essentials required to manage a crisis.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

EverBridge Inc.

Unlock the value of your SAP landscapes with modern storage and data protection
sponsored by Dell Technologies & Intel®
DATA SHEET: Check out this datasheet to learn how Dell EMC Technologies supports SAP HANA and SAP S/4HANA migration with modern storage and data protection.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

Dell Technologies & Intel®

Veeam and Nutanix: Simplify Data Protection and Secondary Storage
sponsored by Veeam Software
WHITE PAPER: Access this ESG white paper to view an integrated, pre-packaged hyperconverged appliance and software solution offering organizations a simpler way to unify on-site/ off-site data protection and recovery.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veeam Software

Conversational Geek eBook: Predictable Recovery
sponsored by Cohesity
WHITE PAPER: It’s time for IT teams to completely shift their approach to recovery, from just planning something that can recover the environment, to a method that will recover when you need it and where you need it, without compromise. Download this ebook to learn how to predictably recover all your data in the event of a ransomware attack.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Cohesity

Why Is A Data Archiving Plan Important?
sponsored by Beta Systems
EGUIDE: When paired with an over-arching data protection plan, a strong archiving strategy can provide storage capabilities that you can use over extended time frames and at a reduced cost. Access this e-guide to learn the 4-step process for setting up a data archival plan and to get briefed on the 6 incentives of having a plan in place.
Posted: 26 Mar 2020 | Published: 24 Mar 2020

Beta Systems

In Your Data Archive Strategy, How Long is Long Enough?
sponsored by Beta Systems
EGUIDE: It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Beta Systems

Cloudian Solutions for Ransomware
sponsored by Cloudian
DATA SHEET: With the WORM approach, once data is written, it cannot be changed or deleted until a certain amount of time has passed, and because the data cannot be modified, it cannot be encrypted, making malware ineffective. Check out this datasheet to learn the 3 ways that WORM-equipped storage can be deployed to protect your apps.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Cloudian

Protect Your Data From Ransomware with Veeam & Cloudian
sponsored by Cloudian
WEBCAST: Dig into this webcast to discover how ransomware works and how Veeam and Cloudian offer customers a way to lock down backup data so it cannot be changed or deleted by ransomware.
Posted: 18 Mar 2020 | Premiered: Feb 19, 2020

Cloudian

Protect Your Data from Ransomware with Veeam and Cloudian Solution Brief
sponsored by Cloudian
DATA SHEET: Cloudian HyperStore enterprise storage complements on-premise disk-based storage and built-in ransomware protection by providing a local, S3-compliant object storage target for Veeam backups over your local, high-speed network. Dig into this datasheet to discover the use cases of this solution and the 6 benefits it offers.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Cloudian

Lock Ransomware Out with Veeam & Cloudian
sponsored by Cloudian
VIDEO: Ransomware has been identified by the World Economic Forum as one of the top five economic risks facing society today, rivaling global warming. Access this webcast to understand how a joint solution from Veeam and Cloudian can provide a hardened approach to keep your data safe from this threat.
Posted: 16 Mar 2020 | Premiered: 27 Feb 2020

Cloudian

Data Protection with Veeam and Cloudian
sponsored by Cloudian
DATA SHEET: Read over this datasheet to explore the Hyper-Availability Platform from Veeam which boasts 8 distinguishing features and benefits—including its ability to integrate with the cloud to leverage additional capacity.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Cloudian

10 Key Everbridge System Considerations for All-Hazards Events
sponsored by EverBridge Inc.
WHITE PAPER: In all, there are 10 system considerations for all-hazard events that organizations should be keeping an eye on. Access this white paper from Everbridge to find out which considerations, if not all of them, can improve crisis and disaster recovery efforts for your organization.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

EverBridge Inc.

Rethinking Storage for Modern Data
sponsored by Pure Storage
DATA SHEET: Choosing a storage solution that lets you seamlessly upgrade when the time comes, reduce planned downtimes, , and provides the freedom to upgrade on your schedule is essential. Explore this datasheet to find out about a flash storage solution that can do just that.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Pure Storage

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella
51 - 75 of 556 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info