Do predefined DLP rules prevent compliance violations?

Data Loss Prevention

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Best of data loss prevention 2013

    Readers vote on the top data loss prevention products in 2013: Information loss prevention, extrusion prevention, protecting intellectual property, identifying and securing sensitive data. 

  • DLP deployments: Understanding your options

    Kevin Beaver examines real-world DLP technologies and discusses some common pitfalls to avoid, ensuring your organization has a successful DLP deployment. 

  • Quiz: DLP deployments: Understanding your options

    This five-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this DLP deployment Security School Lesson by Kevin Beaver. 

  • Quiz: Database security issues

    This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson. 

  • Database security issues

    The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monitor database access to detect potential security incid... 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Readers' Choice Awards 2012

    For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories. 

  • Security visibility: Honestly assessing security posture

    In this security school, you’ll learn how to gain the clearest visibility into the state of your company’s information security efforts. You’ll learn strategically how to make the most of your SIM, log management, network monitoring, GRC and penetrat... 

  • Quiz: Data breach prevention strategies

    Test your knowledge of data breach prevention strategies in this five-question quiz. 

  • Data breach prevention strategies

    This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organizatio...