Data Loss Prevention News
May 06, 2015
Data loss prevention tools have been on the market for close to 10 years, but adoption and deployment are still inconsistent. Experts point to a shift in how enterprises will deploy DLP moving forward.
December 05, 2014
News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services. Continue Reading
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
It’s been a relatively quiet few months in data loss prevention. Not as commonly deployed as firewalls and malware protection, DLP has proven itself as a worthy security control, and its role may continue to grow. The environment DLP seeks to ... Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes lays out six steps to take in order to buy the right data loss protection (DLP) products for your organization. Continue Reading
Learn how to evaluate and buy the right full-disk encryption product for your organization with this FDE buyer's guide. Continue Reading
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
Product ReviewsPowered by IT Central Station
We previously used Backup exec, and evaluated Acronis before we chose this solution. Our ROI is one year.Powered by IT Central Station
I have been using this solution since 2008 and find the fast recover and deduplication of this product valuable. An example of how this product has...Continue Reading
Powered by IT Central Station
Disaster recovery planning is something that seems challenging for all businesses. Virtualization in addition to its operational flexibility,...Continue Reading
Top of the list if you're using VMware or Hyper-V. Would be nice to have more supported hyper-visors.Powered by IT Central Station
Valuable Features: Near real time continuous disaster recovery, Journaling and the ability to replicate from Hyper-V and other VMware clouds...Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
Expert Bill Hayes details usage scenarios for deploying data loss prevention: standalone suites, integrated tools and standalone/integrated DLP combined. Continue Reading
While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Remote wipe is the option most people think of when looking to erase data on mobile phones, but it isn't always the most effective. Expert Nick Lewis explores how to fully remove data from a device. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
Enterprises revisit data classification and protection strategies after rocky 2014. Continue Reading