Data Loss Prevention White Papers

Results 1 - 25 of 192Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 01, 2015

This webcast talks about decentralizing the IoT by leveraging the “block chain”-- the technology platform underlying Bitcoin.

Tags : internet of things, iot, cloud computing, data security, blockchain, big data, app infrastructure, data analytics
    
By: Mimecast     Published Date: Jun 22, 2015

Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, email security, email archiving, data loss prevention
    
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Windstream     Published Date: May 06, 2015

Read this Gartner report to learn how to keep business up and running no matter what.

Tags : business continuity, windstream, gartner, it service, analysis, compliance, disaster recovery, web service security
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Kaspersky     Published Date: Nov 12, 2014

Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.

Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection, network security, anti virus
    
By: Compass Datacenters     Published Date: Jul 07, 2015

The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.

Tags : data center, it decision making, data center operators, it management, storage management, data protection, data loss prevention
    
By: Cisco     Published Date: Jun 10, 2015

This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware
    
By: Lumension     Published Date: Jun 03, 2015

Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.

Tags : security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
By: Cisco     Published Date: May 14, 2015

The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Tags : hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
By: Nexsan by Imation     Published Date: May 11, 2015

It is an inescapable fact that massive, relentless data growth now defines the IT landscape for organizations of all sizes.

Tags : nexsan, imation, data growth, data protection, massive data, dig data, secure storage, infrastructure
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: Bit9     Published Date: Apr 16, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, access control, firewalls, hacker detection
    
By: Citrix Systems     Published Date: Apr 15, 2015

IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.