Data Loss Prevention (DLP) Research
-
Making the Case for Data-Aware Storage
Sponsored by: DataGravityThis e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
-
Prevent unauthorized database access with TDE
Sponsored by: Oracle CorporationThis e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
-
How an Identity Management System can Improve Mobile Security
Sponsored by: Oracle CorporationThis e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Physical vs. Virtual Desktop Security: It's Just Not The Same
Sponsored by: Dell, Inc. and Intel®This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
-
Virtual Desktop Security: Exploring VDI Features
Sponsored by: Dell, Inc. and Intel®This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
-
Layered Security Doesn't Stop Cybercriminals – but VDI Might
Sponsored by: Dell, Microsoft and CitrixThis exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
-
Is it time for a DLP system in your enterprise?
Sponsored by: TechTarget SecurityData loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
-
Get the Upper Hand on Virtual Machine Sprawl
Sponsored by: TechTarget IT OperationsAs hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.
-
Data Loss Prevention: Decision Time
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: RFP Technology Decisions
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
What's New in Symantec Data Loss Prevention
Sponsored by: Symantec CorporationThis data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
6 Ways You can Improve Backup and Recovery
Sponsored by: VMware, Inc.Check out this resource to discover the huge number of benefits that can be gained from leveraging server virtualization.
-
Top 5 Reasons Customers Choose VMware vSphere Data Protection Advanced
Sponsored by: VMware, Inc.This whitepaper examines the top 5 reasons companies are utilizing one single-vendor solution in particular to help meet their backup and recovery needs.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
Sponsored by: ClearswiftIn this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
-
Top 10 Ways to Assess The Risk of Data Loss
Sponsored by: InfrascaleThis white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.