Data loss prevention News
March 23, 2018
Google Cloud Platform upgrades provide deeper protection and visibility for enterprise assets in the cloud, as organizations increasingly mull multi-cloud options.
February 27, 2018
Data loss prevention strategies help prevent unauthorized disclosure of sensitive information. For a DLP strategy to be successful, however, business-wide buy-in is required.
January 31, 2018
This week, bloggers focus on the growing role of AI in cybersecurity, achieving simple, stable networks and running EVPN in a single data center fabric.
January 30, 2018
Microsoft was forced to release an out-of-band Spectre patch designed not to mitigate the vulnerability but to protect users from Intel's broken fix.
Data loss prevention Get Started
Bring yourself up to speed with our introductory content
When backing up to the cloud, it's important to take precautions against data loss. See how approaches like redundancy can bolster your backup strategy. Continue Reading
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.
Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.
In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.Continue Reading
Evaluate Data loss prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
You can simplify the process of buying an ADC device by examining how leading vendors address key considerations, including platform options, security and server load balancing. Continue Reading
Although hybrid arrays are similar in functionality from one system to another, subtle differences in features can make one array more appropriate for a given application. Continue Reading
Cloud and distributed apps create complex security challenges. CASBs aim to resolve these issues with features for threat protection, data loss prevention and more. Continue Reading
Manage Data loss prevention
Learn to apply best practices and optimize your operations.
Everyone is putting their data in the cloud, from IT staff to department heads. With functionality galore, basic security measures too often go unchecked. Continue Reading
Each enterprise has different needs when it comes to preventing data leakage. Admins should be aware of the Office 365 mailbox and encryption features that help the organization meet its requirements. Continue Reading
Some large U.S. companies have been working behind the scenes on GDPR requirements for more than a year, but there's strong evidence that many have not been as diligent. Continue Reading
Problem Solve Data loss prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content. Continue Reading
Regulations like the GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption. Continue Reading
A ransomware attack is not your typical data loss event. Some data protection vendors get the picture and are incorporating ransomware-specific features in their products. Continue Reading