Data Loss Prevention White Papers

Results 1 - 25 of 217Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Jul 17, 2015

Why app and desktop virtualization should be the foundation for your layered approach.

Tags : information security, layered approach, mobility, application, desktop virtualization, application security, compliance, application integration
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe

Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.

Tags : endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management
    
By: CDW     Published Date: Jul 08, 2015

A key to safeguarding data and apps is finding the right partner.

Tags : security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management
    
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management
    
By: CDW     Published Date: Jul 08, 2015

Addressing vulnerabilities in this growing risk environment.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, mobile, strategy, best practices
    
By: CDW     Published Date: Jul 08, 2015

Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.

Tags : security, data protection, dlp, data breach, vulnerability management, security management, security policies, data loss prevention
    
By: IBM     Published Date: Jul 01, 2015

This webcast talks about decentralizing the IoT by leveraging the “block chain”-- the technology platform underlying Bitcoin.

Tags : internet of things, iot, cloud computing, data security, blockchain, big data, app infrastructure, data analytics
    
By: Mimecast     Published Date: Jun 22, 2015

Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, email security, email archiving, data loss prevention
    
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Windstream     Published Date: May 06, 2015

Read this Gartner report to learn how to keep business up and running no matter what.

Tags : business continuity, windstream, gartner, it service, analysis, compliance, disaster recovery, web service security
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.