loss prevention

Results 101 - 119 of 119Sort Results By: Published Date | Title | Company Name

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
SilverSky

The case for cloud-based disaster recovery

Published By: IBM     Published Date: Oct 10, 2013
In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability
Tags : 
cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses
    
IBM

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
IBM

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Portuguese)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: The Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Discover, Monitor and Protect Your Sensitive Information: Symantec Data Loss Prevention

Published By: Symantec     Published Date: Jun 18, 2015
Learn how to discover, monitor and protect your sensitive information to maximize the efficiency of your data management and see how you can greatly improve your data loss prevention.
Tags : 
security, data loss prevention, data management, monitor and protect, data efficiency
    
Symantec

NPMD for Network Security Forensics

Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions

How Access Governance Makes Data Loss Prevention Successful

Published By: RSA Security     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
    
RSA Security

Secure Email Gateways

Published By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity, access control, anti spam
    
Mimecast

Best Practices for Implementing Data Loss Prevention (DLP) Webinar

Published By: McAfee     Published Date: Nov 12, 2014
Webinar showcasing best practices for implementing data loss preventino (DLP). Featuring Michael Avdeev, Enterprise Security Architect for the Intel Security Group.
Tags : 
data loss prevention, dlp, best practices, dlp implementation, it management, data management
    
McAfee

Five DLP Tips from Security Executives

Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
    
Symantec

Gartner MQ for Email & Web Security

Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco

Agile Data Masking for Loss Prevention and Threat Reduction

Published By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
    
Delphix

Data Exfiltration in Depth

Published By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : 
data exfiltration, data loss prevention, dlp, data management, research
    
Intel Security

Content Aware Protection for Your Most Sensitive Data

Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management, knowledge management
    
IBM

Endpoint Data Protection: A Buyer’s Checklist

Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault

Unified Endpoint Management: the Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.