Data loss prevention News
February 28, 2017
Digital rights management (DRM) capabilities are often embedded in third party software products via partnerships agreements. One DRM supplier, Seclore, has made such OEM relationships its main ...
January 12, 2017
A quiet AWS acquisition last year could improve customers' ability to detect and respond to cyberattacks at scale through automation and machine learning.
October 20, 2016
A more affordable Workspace One bundle with less advanced management capabilities could appease IT pros who view workspace suites as too pricey.
June 27, 2016
Hit by a ransomware attack, a NASCAR race team paid to restore data worth millions, then called on Malwarebytes to secure their systems -- and Malwarebytes joined up as a sponsor.
Data loss prevention Get Started
Bring yourself up to speed with our introductory content
Duplicate records are an unfortunate reality for hospitals and can be harmful to patients. An MPI is one way to ensure that patients only have one record in a health system. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
An application delivery controller (ADC) sits between you and the web server farm to manage the traffic between you and any number of back-end servers. In other words, app delivery controllers control the delivery of the web application to you -- hence the name.
Older ADCs required custom ASICs, which raised costs, but processing power has advanced so that ADCs with sophisticated functionality can be implemented in software and run on cost-effective general-purpose processors. This allows today's app delivery controllers to be implemented not only as standalone hardware devices but quite effectively as virtual appliances as well or as a hosted service. In other words, more companies than ever can afford an ADC.
This Buyer's Guide explains key developments in app delivery controller technology and reviews the features ADCs can have. It serves as a manual for networking professionals and others involved in acquiring an app delivery controller for their particular company.Continue Reading
Evaluate Data loss prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes examines Trustwave Data Loss Prevention and how the product addresses data at rest, endpoint data in use and network data in transit for enterprises. Continue Reading
Breach detection systems are essential in these days of machine learning and artificial intellingence. Learn how to identify the features and functions your network needs. Continue Reading
Expert Bill Hayes examines the Trend Micro Integrated Data Loss Prevention product, which acts as a software plug-in with other Trend Micro security products. Continue Reading
Manage Data loss prevention
Learn to apply best practices and optimize your operations.
Cloud access security brokers offer CISOs a way to set policy and gain better understanding of cloud services and data in use across the enterprise. Do these tools fill the gaps? Continue Reading
Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks. Continue Reading
SWIFT banking has a team dedicated to data breach investigations. Expert Mike O. Villegas discusses why this is necessary and whether other organizations should follow suit. Continue Reading
Problem Solve Data loss prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft bolstered the data loss prevention features in Office 365 to protect more than just email. Learn how to expand DLP protection to SharePoint and OneDrive. Continue Reading
It's important to prevent data loss during a Linux OS upgrade. How can partitions or disk drives help IT teams meet that goal? Continue Reading
Security is a top concern in health IT, especially given that attacks have become more sophisticated and frequent. A CIO talks about key technologies for preventing ransomware. Continue Reading