IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Loss Prevention (DLP)

RSS Feed   
DEFINITION: Computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders.
Data Loss Prevention (DLP) Reports
51 - 75 of 498 Matches Previous Page  |  Next Page
Machina Tools for Cloud Storage
sponsored by Ionic Security
DATA SHEET: A data security solution for multi-cloud storage should provide cross-cloud data security, automated incident responses, regulatory requirement tracking, and data security blind spot protection. Access this datasheet to explore a single interface multi-cloud solution that does all this while providing 3 key business benefits.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Ionic Security

Pulsant Delivers Complete Peace of Mind to Scottish Building Society
sponsored by Pulsant
CASE STUDY: The Scotland Building Society needed risk and revenue loss mitigation capabilities and a secure location for its production servers. Access this case study to view the disaster recovery solution that SBS implemented and the results that it led to, which included a resilient, highly secure data center.
Posted: 28 Feb 2020 | Published: 28 Feb 2020


Implementing Privacy Policy: Scaling Your Data Privacy Program
sponsored by Ionic Security
VIDEO: View this Ionic Security demo to see scalable and consistent data protection in action ⁠— through the lens of a custom HR app.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Disaster Recovery Planning Ahead
sponsored by OffSiteDataSync and Veeam
EBOOK: A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

OffSiteDataSync and Veeam

Confusion as a Service: Breaking Down the Differenced of DRaaS, BaaS, and IaaS
sponsored by OffSiteDataSync and Veeam
WEBCAST: When it comes to picking services to secure your data, what do you actually need and what are the key differences between approaches? Access this webcast from OffsiteDataSync and Veeam to better understand the differences between IaaS, DRaaS, and BaaS—different backup and DR service types that can help when disaster strikes.
Posted: 24 Feb 2020 | Premiered: Feb 24, 2020

OffSiteDataSync and Veeam

The Ascent to Hyperscale
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: To manage massive data growth and long-term retention challenges, organizations are leveraging tape technology solutions. Access this white paper to learn how modern tape can fulfill the needs of the hyperscale data center, to view a case study on maximizing data protection efficiency, and to discover the 6 points to remember about modern tape.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Fujifilm Recording Media USA, Inc.

The Definitive Guide to Rubrik Cloud Data Management
sponsored by Rubrik
EBOOK: Read this e-book to learn about a radically new approach to cloud data management that provides foundational tools to simplify backup and recovery, reclaim valuable time for business-critical projects and enable self-service data management.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Rubrik

The Role of Cloud Backup and Recovery in Protecting Against Ransomware Attacks
sponsored by Rubrik
EBOOK: Neither traditional nor native no relational database tools deliver the necessary backup and recovery capabilities required to protect against ransomware. Dive into this ebook to research a solution meant to work with non-relational databases and applications while filling in 5 key gaps left by traditional backup and scripted solutions.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Rubrik

Protecting NAS at Scale with Rubrik
sponsored by Rubrik
WHITE PAPER: Protecting this data requires a solution that is designed and built to protect terabytes to petabytes of unstructured data. Explore this e-book to learn about a three-phase approach to NAS protection that benefits users in a wide range of areas—capacity and scale among them—and which overcomes the drawbacks of NDMP.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Rubrik

Rubrik and Amazon Web Services
sponsored by Rubrik
EBOOK: By marrying non-cloud systems with cloud-native applications and infrastructures, new principles are emerging, like the shift from asset to service consumption, automated service delivery, and microservice applications. Access this e-book to learn how cloud data management works, its use cases, and a data management solution designed for AWS.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Rubrik

Protect Your Data in Amazon S3: Product Overview
sponsored by Ionic Security
DATA SHEET: In this paper, learn Ionic Machina enables the management of your sharedresponsibility by securing your data in Amazon S3 .
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Ionic Security

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Data protection & compliance for Australian/New Zealand businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

ASEAN IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

ComputerWeekly.com

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

Best Practices for Data Backup and DR Planning in 2019
sponsored by New Cloud Networks
EGUIDE: In this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
Posted: 21 Dec 2018 | Published: 20 Dec 2018

New Cloud Networks

The Security Benefits of DLP
sponsored by InteliSecure
EGUIDE: Security breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
Posted: 09 Mar 2018 | Published: 07 Mar 2018

InteliSecure

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

When Cyberthieves Attack, Technologies Have Your Back
sponsored by SearchHealthIT.com
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.

Enhance Your Endpoint Security Protection
sponsored by Trend Micro, Inc.
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

Trend Micro, Inc.

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM
51 - 75 of 498 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info