Data Loss Prevention
- July 17, 2008
Companies are concerned about unintentional data leaks, according to a survey conducted by Osterman Research.
- July 08, 2008
Some vendors, including Check Point and PGP see growth in whole-disk encryption for Mac OS X laptops on enterprise platforms.
- June 12, 2008
The data leakage prevention market is branching out into automating data classification, analysis and device management, according to a report from Forrester Research Inc.
- April 10, 2008
SAN FRANCISCO -- Companies need to embark on data classification projects to gain more control over its movement and minimize data leakage, but it's difficult to find a company successfully carrying out a project. Rena Mears, Deloitte's global and ...
- March 04, 2008
Symantec added whole disk and removable storage encryption to its portfolio through a partnership with GuardianEdge, working to strengthen its competitive position.
- November 29, 2007
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey.
- October 25, 2007
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday.
- October 15, 2007
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready?
- June 12, 2007
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft.
- May 31, 2007
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined.
- May 22, 2007
While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data.
- June 06, 2006
Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC.
- June 29, 2004
Peruse the top 10 news articles and tips published by SearchSecurity.com in June.
- June 01, 2004
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
- May 27, 2004
Peruse our top 10 tips and top 10 news articles for the month of May.