Data Loss Prevention (DLP) White Papers
-
Redefining DLP
Sponsored by: ProofpointData loss prevention (DLP) in a modern cloud architecture is markedly different from years prior, requiring comprehensive solutions, high-quality vendor partnerships, and a people-first approach. Explore this white paper to understand the essentials of DLP in modern IT stacks and discover strategies you can use to foster employee buy-in.
-
Infographic: 10-step guide for testing backups
Sponsored by: TechTarget ComputerWeekly.comCreating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.
-
How to Test Your Company’s Disaster Preparedness
Sponsored by: Ensono LimitedCompanies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.
-
Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
-
CW APAC, June 2020: Trend Watch - data protection
Sponsored by: TechTarget ComputerWeekly.comAsia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
Trouble at your door: targeted cyber attacks in the UK and Europe
Sponsored by: TechTarget ComputerWeekly.comThis research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
-
CW Nordics August 2016
Sponsored by: TechTarget ComputerWeekly.comThe Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.
-
CW APAC, June 2020: Trend Watch - data protection
Sponsored by: TechTarget ComputerWeekly.comAsia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
-
Breaking Down Industry Leading Data Protection Vendors & Options
Sponsored by: TechTarget Data BackupRead this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.
-
Navigating Ransomware Recovery
Sponsored by: Cisco UmbrellaThe decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
-
Navigating VMware and Cloud Backups
Sponsored by: ClumioVMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
-
Best Practices for Data Backup and DR Planning in 2019
Sponsored by: New Cloud NetworksIn this forward-thinking guide, our experts walk you through 10 backup planning best practices, 3 common DR challenges from this year and how to learn from them, and more. Use this guide as a means of benchmarking your current processes and planning for next year.
-
The Security Benefits of DLP
Sponsored by: InteliSecureSecurity breaches continue to harm enterprises, leaving organizations scrambling to safeguard their data from unauthorized disclosure. This e-guide offers expert insight into DLP implementation and how it can secure sensitive data from costly, detrimental breaches.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
When Cyberthieves Attack, Technologies Have Your Back
Sponsored by: TechTarget Health ITAccess this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
Enhance Your Endpoint Security Protection
Sponsored by: Trend Micro, Inc.Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
-
How IAM Can Address Unstructured Content Security Risks
Sponsored by: IBMIn this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
Is the Hybrid Storage Array Dying?
Sponsored by: Dell EMCIs hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
-
Malware Hitching a Ride on Mobile Apps?
Sponsored by: TechTarget SecurityThe latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
-
Mastering the Top Enterprise Mobility Challenges
Sponsored by: MicrosoftMobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.