Data loss prevention technology
In this guide learn about the basics of data loss prevention technology and data loss threats. Find out how to build a security system to detect and prevent malicious hacker activity with data loss prevention (DLP) technology, software and products.
New & Notable
Data loss prevention technology News
-
July 23, 2020
23
Jul'20
Microsoft unveils new DLP, 'Double Key Encryption' offerings
Microsoft revealed new security products and features this week, including an Endpoint Data Loss Prevention product as well as "Double Key Encryption" for Microsoft 365.
-
July 30, 2019
30
Jul'19
Carbonite CEO joins IDG, interim CEO steps in
Former Carbonite CEO Mohamad Ali joined tech media company International Data Group as Steve Munford stepped in to become interim CEO.
-
July 24, 2019
24
Jul'19
Acronis CEO: 'Backup is dead'
Backup alone is not enough, according to Acronis CEO Serguei Beloussov. True data protection involves a combination of security, privacy and accessibility on top of backup.
-
June 03, 2019
03
Jun'19
McAfee Database Security to improve Amazon RDS cloud security
With its latest release, McAfee intends to improve Amazon RDS security and prevent cyberattacks with its new McAfee Database Security suite of cloud security products.
Data loss prevention technology Get Started
Bring yourself up to speed with our introductory content
-
Try this cybersecurity quiz, test your cyberdefense smarts
Based on the November 2020 issue of Information Security magazine, this 10-question quiz lets you check your comprehensive knowledge of current security issues and earn CPE credit too. Continue Reading
-
AI in security analytics is the enhancement you need
AI-powered analytics is critical to an effective, proactive security strategy. Learn how AI-enabled tools work and what your organization needs to do to reap their benefits. Continue Reading
-
Format-preserving encryption use cases, benefits, alternative
With format-preserving encryption, a ciphertext's format is the same as its plaintext's. Read up on the benefits of this cryptography method, NIST FPE methods, vendors and more. Continue Reading
Evaluate Data loss prevention technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
AI in cybersecurity ups your odds against persistent threats
AI capabilities can identify and take down cyberthreats in real time but are only part of what your team needs to come out on the winning side of the cybersecurity battle. Continue Reading
-
How data loss prevention strategies benefit from UBA
Data loss prevention strategies require unique insight into user activity. Can user behavior analytics capabilities benefit threat management and breach detection? Continue Reading
-
Utilize SMB security tools to work from home safely
With the global pandemic forcing enterprise workers home, SMB security tools can provide necessary protection for newly built home offices in order to keep business moving. Continue Reading
Manage Data loss prevention technology
Learn to apply best practices and optimize your operations.
-
8 benefits of a security operations center
A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. Here are eight SOC benefits to consider. Continue Reading
-
AI cybersecurity raises analytics' accuracy, usability
-
Big data security management embraces governance, privacy
Cyberattacks, GDPR and CCPA compliance, and COVID-19 present serious security and privacy challenges for managers tasked with protecting their data stores. Continue Reading
Problem Solve Data loss prevention technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Protect against evolving data security threats
As data security threats evolve, knowing how to protect your data is more important than ever. Learn about the latest security threats and how to ward them off. Continue Reading
-
Combat the human aspect of risk with insider threat management
When it comes to insider threat awareness and prevention, enterprises would be wise to marry a people-centric approach with a technology-centric approach. Continue Reading
-
The difference between AES and DES encryption
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between AES and DES. Continue Reading