Do predefined DLP rules prevent compliance violations?

Data Loss Prevention

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What's the best focus for MDM strategy now?

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for mobile... 

  • Filling the data protection gap

    Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data prot... 

  • Real-world solutions for data loss prevention

    This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an ... 

  • Nine tips to guarding your intellectual property

    How secure is your intellectual property? In this issue, learn strategies that can help you keep it safe, and secret. Also, read about the difference between trade secrets and patents, and the consequences of IP spillage. 

  • How to stop data leakage

    In this month's issue of Information Security magazine, learn about how security managers are looking for security in the cloud, and how to best protect your data. We review TriCipher's TACS v3.1.1, M-Tech Information Technology's ID-Synch v4.0 and m... 

  • Best of data loss prevention 2013

    Readers vote on the top data loss prevention products in 2013: Information loss prevention, extrusion prevention, protecting intellectual property, identifying and securing sensitive data. 

  • DLP deployments: Understanding your options

    Kevin Beaver examines real-world DLP technologies and discusses some common pitfalls to avoid, ensuring your organization has a successful DLP deployment. 

  • Quiz: DLP deployments: Understanding your options

    This five-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this DLP deployment Security School Lesson by Kevin Beaver. 

  • Quiz: Database security issues

    This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson. 

  • Database security issues

    The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monitor database access to detect potential security incid... 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Readers' Choice Awards 2012

    For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories. 

  • Security visibility: Honestly assessing security posture

    In this security school, you’ll learn how to gain the clearest visibility into the state of your company’s information security efforts. You’ll learn strategically how to make the most of your SIM, log management, network monitoring, GRC and penetrat... 

  • Quiz: Data breach prevention strategies

    Test your knowledge of data breach prevention strategies in this five-question quiz. 

  • Data breach prevention strategies

    This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organizatio... 

  • See more Essential Knowledge on Data Loss Prevention
  • context-aware security

    Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions. 

About Data Loss Prevention

In this intrusion detection and prevention guide learn how to build a security system to detect and prevent malicious hacker activity with data loss prevention (DLP) software and products.