Do predefined DLP rules prevent compliance violations?

Data Loss Prevention

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What's the best focus for MDM strategy now?

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for mobile... 

  • Filling the data protection gap

    Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data prot... 

  • Real-world solutions for data loss prevention

    This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an ... 

  • Nine tips to guarding your intellectual property

    How secure is your intellectual property? In this issue, learn strategies that can help you keep it safe, and secret. Also, read about the difference between trade secrets and patents, and the consequences of IP spillage. 

  • How to stop data leakage

    In this month's issue of Information Security magazine, learn about how security managers are looking for security in the cloud, and how to best protect your data. We review TriCipher's TACS v3.1.1, M-Tech Information Technology's ID-Synch v4.0 and m...