Data Loss Prevention News
May 06, 2015
Data loss prevention tools have been on the market for close to 10 years, but adoption and deployment are still inconsistent. Experts point to a shift in how enterprises will deploy DLP moving forward.
December 05, 2014
News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn how to evaluate and buy the right full-disk encryption product for your organization with this FDE buyer's guide. Continue Reading
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
Product ReviewsPowered by IT Central Station
We previously used Backup exec, and evaluated Acronis before we chose this solution. Our ROI is one year.Powered by IT Central Station
I have been using this solution since 2008 and find the fast recover and deduplication of this product valuable. An example of how this product has...Continue Reading
Powered by IT Central Station
Disaster recovery planning is something that seems challenging for all businesses. Virtualization in addition to its operational flexibility,...Continue Reading
Top of the list if you're using VMware or Hyper-V. Would be nice to have more supported hyper-visors.Powered by IT Central Station
Valuable Features: Near real time continuous disaster recovery, Journaling and the ability to replicate from Hyper-V and other VMware clouds into...Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading
Expert contributor Karen Scarfone examines the most important criteria for evaluating email encryption software for deployment within the enterprise. Continue Reading
Enterprises revisit data classification and protection strategies after rocky 2014. Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Remote wipe is the option most people think of when looking to erase data on mobile phones, but it isn't always the most effective. Expert Nick Lewis explores how to fully remove data from a device. Continue Reading
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading