Data loss prevention News
February 28, 2017
Digital rights management (DRM) capabilities are often embedded in third party software products via partnerships agreements. One DRM supplier, Seclore, has made such OEM relationships its main ...
January 12, 2017
A quiet AWS acquisition last year could improve customers' ability to detect and respond to cyberattacks at scale through automation and machine learning.
October 20, 2016
A more affordable Workspace One bundle with less advanced management capabilities could appease IT pros who view workspace suites as too pricey.
June 27, 2016
Hit by a ransomware attack, a NASCAR race team paid to restore data worth millions, then called on Malwarebytes to secure their systems -- and Malwarebytes joined up as a sponsor.
Data loss prevention Get Started
Bring yourself up to speed with our introductory content
An application delivery controller (ADC) sits between you and the web server farm to manage the traffic between you and any number of back-end servers. In other words, app delivery controllers control the delivery of the web application to you -- hence the name.
Older ADCs required custom ASICs, which raised costs, but processing power has advanced so that ADCs with sophisticated functionality can be implemented in software and run on cost-effective general-purpose processors. This allows today's app delivery controllers to be implemented not only as standalone hardware devices but quite effectively as virtual appliances as well or as a hosted service. In other words, more companies than ever can afford an ADC.
This Buyer's Guide explains key developments in app delivery controller technology and reviews the features ADCs can have. It serves as a manual for networking professionals and others involved in acquiring an app delivery controller for their particular company.Continue Reading
Application delivery controllers have advanced in ways that make ADCs more useful for a wider range of companies than ever before. This guide outlines what you need to know in order to buy the best application delivery controller for your company. Continue Reading
Next-generation firewalls are integrated, hardware- or software-based, network security tools designed to detect and block sophisticated attacks. The NGFWs available on the market today can vary significantly from one another in many ways, including both price and the specific features provided. Choosing the best next-generation firewall requires careful study of the technology in general, and an understanding of your system's particular needs. Choosing a next-generation firewall requires a thorough understanding of the purpose of NGFWs and how one firewall product may differ from another. NGFWs come in a variety of configurations and price ranges.
This Buyer's Guide explains what corporate technology buyers must know before they can decide which is the best next-generation firewall for their purposes. Infosec pros and corporate executives with IT purchase responsibilities will come away from reading this guide with a clearer understanding of what an NGFW does and how to weigh the many factors to determine which product is right for their situation.Continue Reading
Evaluate Data loss prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes takes a closer look at McAfee Total Protection for Data Loss Prevention, a DLP software suite for deployment on hardware and virtual appliances. Continue Reading
Expert Bill Hayes examines the RSA Data Loss Prevention Suite, which covers data in use, in transit and at rest for corporate networks, mobile devices and cloud services. Continue Reading
Banner Health in Arizona, 21st Century Oncology in Florida, Peachtree Orthopaedic Clinic in Georgia -- the list of healthcare cyberattack victims last year seems endless. In those three facilities alone, more than 6 million patients were victimized by cyberattacks involving network servers. In 2016, the number of people affected overall by healthcare data breaches jumped 33% and hacking incidents soared 63% compared to the previous year, according to the U.S. Office for Civil Rights. For many reasons, healthcare has become a prime feeding ground for cybercriminals. 2017 expects to see cyberthieves employ even more sophisticated hacking techniques to penetrate vulnerable databases and compromise the private information of millions of susceptible patients.
Are these cyberattacks inevitable or preventable? The cover story of January's Pulse examines the many cybersecurity technologies and techniques that can help prevent, detect, respond to and recover from cyberattacks. Health IT professionals provide insight into viable cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. In another feature, we look at the harsh realities of data breaches and ransomware attacks, including some of the most devastating healthcare cybercrimes of 2016. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.Continue Reading
Manage Data loss prevention
Learn to apply best practices and optimize your operations.
Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks. Continue Reading
SWIFT banking has a team dedicated to data breach investigations. Expert Mike O. Villegas discusses why this is necessary and whether other organizations should follow suit. Continue Reading
Security is a top concern in health IT, especially given that attacks have become more sophisticated and frequent. A CIO talks about key technologies for preventing ransomware. Continue Reading
Problem Solve Data loss prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange administrators can use PowerShell to manage Office 365 compliance, e-discovery and data loss prevention. Continue Reading
The types of DDoS attacks organizations face have grown and size of these attacks has increased. Expert Michael Cobb explains how to secure systems against common DDoS methods. Continue Reading
Stronger network security could be the key to preventing a ransomware infection. Expert Kevin Beaver has five ways organizations can improve their networks to stop this threat. Continue Reading