DLP Software

DLP Software | News, how-tos, features, reviews, and videos

Ready for a data breach? How to develop your response plan

As of Oct. 23, there have been 347 data breaches reported in 2012 -- more than one per day. Does your organization have a thorough response plan in case you become case No. 348? The Online Trust Alliance has a free guide that will...

Rebuttal to Stiennon: Why risk management can succeed in IT

Earlier this week Richard Stiennon published an article that questions the value of risk management in IT, and I would argue that, although risk management presents challenges to IT, best practice-driven approaches leveraging aspects...

In security response, practice makes perfect

We've heard it many times in many forms -- expect to be breached, expect that you've been breached, expect that you are being breached.

General Dynamics buying Fidelis Security for DLP expertise

General Dynamics Monday announced plans to acquire Fidelis Security Systems for an undisclosed amount in an effort to bolster the former's expertise in data-loss prevention (DLP) technologies.

Office 2013: Everything IT needs to know

With Office 2013, Microsoft sets the bar high. The reworked suite of applications runs on a range of devices, including new Windows tablets; it has a new look, which is fast and fluid, yet has familiar commands; it responds to touch...

Cisco Ironport delivers strong email protection

The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then...

DLP tools deliver strong endpoint protection

With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or...

How we tested DLP products

We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following...

Best practices for printer security

Most companies pay significant attention to protecting data while it is at rest in storage or in use in an application, but what about when data is printed in documents? This could be a security breach waiting to happen. HP offers us...

For BYOD Best Practices, Secure Data, Not Devices

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile...

An assessment of how the US government is trying to improve security

The mood of the American people is changing, and changing fast. The president has recognized this and, while some may complain about the treatment of Bradley Manning, the WikiLeaks criminal, most are fed up to the teeth with the chaos...

Symantec: Small-company security problems can threaten large corporate nets

Attackers used smaller businesses with less stringent security as gateways to their ultimate targets -- large corporations or governments that hold valuable secrets, according to a Symantec report on Internet security.

The CFO's role in the cloud question

Cloud computing will affect everything in your organization -- right down to the bottom line. For the CFO whose job centers on managing risk, what happens to your organization's data in the cloud is directly relevant to your role in...

Feds to Unveil Insider Threat Defense Plan by Year End

In response to the embarrassing WikiLeaks data leak that laid bare lax information policies, a presidential task force is developing new standards and guidance for deterring and detecting insider threats.

IT Must Provide Enterprise Collaboration Tools Employees Will Use

Businesses are under pressure to enable collaboration beyond the corporate firewall as workers increasingly need to connect with remote colleagues as well as business partners, suppliers and consultants. The challenge to IT...

Cisco helps users welcome BYOD

Cisco is taking this BYOD thing seriously. The company this week unveiled new and enhanced products designed to specifically manage yet optimize a workplace for employees plugging in their own personal devices.Cisco enhanced its...

Next up for DLP: The cloud?

Traditionally there have been two ways to host a data loss prevention security service: An on-premise application managed by the customer, or an on-premise application managed by the DLP supplier. BEW Global, a managed security...

Making sense of mobile device, app, and information management

As BYOD moves out of basic email access, IT seeks control over apps and data on users' devices. What can IT actually get?

Full visibility into high-performance nets: Demand 100% packet capture

A new class of packet-based network monitoring and recording solutions are emerging that enable companies running high-speed and ultra-high-speed networks to address the issue of network blindness, a condition that exposes...

Security at the scene of the crime

Do homeowners feel the need for extra security if their property was once the scene of a terrible crime? We went to some of L.A.'s most notorious crime scenes in search of answers.

Load More
Top News