Do predefined DLP rules prevent compliance violations?

Data Loss Prevention

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Realign your data protection strategy efforts

    In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. 

  • Forrester's advice for data governance maturity model success

    Forrester Research Senior Analyst Andrew Jaquith gives advice for data governance maturity model success and why enterprises should do more than just follow a standardized set of guidelines to protect data. 

  • Fact or fiction: Inside extrusion detection and prevention technology

    According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing ne... 

  • Defining DLP

    The rash of information thefts, security breaches and data loss incidents in recent years has driven the development of a new breed of products designed to prevent sensitive data from making its way out of enterprise networks. But there is a lot of c... 

  • FAQ: Corporate Web 2.0 Threats

    In this expert video, you will learn about Web 2.0 software, the threats it poses, and whether the benefits outweigh the risks. Key areas covered include the threats posed by services like Facebook, MySpace, and LinkedIn, as well as wikis and blogs. ... 

  • Fact or fiction: The security risks of cloud computing

    Check out this expert podcast and learn about the benefits of cloud computing and SaaS and get tips for addressing the security challenges of these business options. 

  • Fact or fiction: Don't forget about your intellectual prop

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Check out the expert Podcast featured here and learn more about creating a... 

  • Fact or fiction: Building and enforcing DLP policies

    Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. Thi... 

  • How to analyze internal security threats: Network security from the inside out

    Learn to effectively assess threats from internal clients, detect anomalies in outgoing traffic, architect networks to resist internal attacks, respond effectively when attacks occur and more.