Data Loss Prevention (DLP) Research
-
Cloud Security Gateways Rise to the Data Loss Challenge
Sponsored by: TechTarget SecurityThis issue of Information Security magazine uncovers cloud data loss prevention (DLP) strategies and whether CASBs can offer another layer of protection. Additionally, learn about the Cybersecurity National Action Plan and the readers' top picks for endpoint protection software.
-
An Effective Data Archiving System Can Ease Backup Woes
Sponsored by: VeritasThis e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
-
Making the Case for Data-Aware Storage
Sponsored by: DataGravityThis e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
-
Prevent unauthorized database access with TDE
Sponsored by: Oracle CorporationThis e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
-
How an Identity Management System can Improve Mobile Security
Sponsored by: Oracle CorporationThis e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Physical vs. Virtual Desktop Security: It's Just Not The Same
Sponsored by: Dell, Inc. and Intel®This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
-
Virtual Desktop Security: Exploring VDI Features
Sponsored by: Dell, Inc. and Intel®This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
-
Layered Security Doesn't Stop Cybercriminals – but VDI Might
Sponsored by: Dell, Microsoft and CitrixThis exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
-
Is it time for a DLP system in your enterprise?
Sponsored by: TechTarget SecurityData loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
-
Get the Upper Hand on Virtual Machine Sprawl
Sponsored by: TechTarget IT OperationsAs hypervisor features have become increasingly similar, the next vendor battleground will be management software. Microsoft and VMware have similar capabilities, and now they'll look to make their product stand out by touting their management tools and complimentary products.
-
Data Loss Prevention: Decision Time
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: RFP Technology Decisions
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
What's New in Symantec Data Loss Prevention
Sponsored by: Symantec CorporationThis data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
6 Ways You can Improve Backup and Recovery
Sponsored by: VMware, Inc.Check out this resource to discover the huge number of benefits that can be gained from leveraging server virtualization.
-
Top 5 Reasons Customers Choose VMware vSphere Data Protection Advanced
Sponsored by: VMware, Inc.This whitepaper examines the top 5 reasons companies are utilizing one single-vendor solution in particular to help meet their backup and recovery needs.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.