Product and Services Finder

Data Loss Prevention

    
<  1  2  3  4  5  6  11  18  >
CoSoSys  CoSoSys is specialized in network Device Control, Data Loss Prevention (DLP) for Windows, Mac OS X and Linux, Mobile Device Management (MDM) and Mobile Application Management for iOS and Android and development of...
 
Endpoint Protector 4 - DLP, Device Control and MDM solution for SMBs and Enterprises DLP, Device Control and MDM solution to protect your network from the threats posed by portable storage devices, uncontrolled data transfers to online...
 
Endpoint Protector Basic - USB Lockdown for standalone PCs or Macs USB and device control for data protection on small offices or home use PCs or Macs
 
Code Green Networks  Code Green Networks delivers data loss prevention solutions that enable organizations around the world to protect confidential customer data and safeguard intellectual property.
Lync Software  Founded in 2000, Lync provides data loss prevention solutions that assist organizations reduce the risk of malicious or inadvertent data loss caused by removable media and mobile devices.
RSA  RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges, including managing organizational risk, safeguarding mobile access and collaboration, proving...
GTB Technologies  GTB Technologies provides comprehensive security solutions for detecting and preventing information leaks and outbound content compliance.
TechnoData Interware  Protect software using USB, LPT dongles.Matrix is already being used in thousands of cases worldwide and successfully protects the development investments. Since the introduction of the dongle, many of our clients have...
 
Matrix-Dongle for Parallel-Ports The Matrix modules of the ML and the MK series for the printer interface are simply plugged into the LPT interface, where they function perfectly without...
 
Matrix-Dongle for USB-Ports Functionally, the Matrix modules of the MLU and the MKU series for the USB interface are identical with the modules ML and MK for the LPT connection, and...
ASR Data  ASR Data was asked to develop a software tool and methodology to support the unique requirements of the law enforcement community. At that time, conducting a computer investigation was a tedious, time-consuming process...
i365  At i365, A Seagate Company, we develop professional-grade on-premise and cloud-connected storage solutions for small and mid-size businesses (SMBs) and remote office/branch office (ROBO) locations. You can ensure business...
 
Data Protection Software-EVault for DPM Microsoft DPM offers best-of-breed data protection for Microsoft computing environments, including those with virtual machines hosted on servers running...
Apani Networks  Apani® is the preeminent provider of identity-aware networking solutions for large enterprises, protecting an organization's internal network and business-critical data from intruders. Apani EpiForce®, the company’s...
 
EpiForce Traditional networks are basically anonymous. Guests, employees, remote employees, contractors, partners and other users all need access to an...
 
EpiForce VM - Securing Virtual Servers EpiForce® VM helps an organization accelerate adoption of server virtualization by securing virtual machines (VMs), physical servers and clients on their...
AlterPoint  AlterPoint network governance solutions optimize network spend and better align IT with business imperatives. The world's most respected enterprises rely on AlterPoint to curb operational costs, reduce specialized labor,...
 
Enterprise Network Configuration management solutions AlterPoint has never been afraid of speed, but now the nation’s fastest back up solution just picked up the pace.Now back up your network devices 100X...
Aurora Enterprises  Since 1990, security-conscious companies have turned to Aurora Enterprises’ professionals for support of their business critical applications. Our experienced team of security experts helps our clients to conquer the...
 
Assessments Security risks have moved beyond the network and operating systems and are more significant in the application and access to data through applications....
 
DLP Solution Aurora’s Data Loss Prevention (DLP) protects sensitive privacy data and hard-to-control financial data, source code, formularies, and designs. We remove...
Code Red Systems  Code Red was incorporated in 2004 by a group of highly experienced entrepreneurs and was initially funded by JC Technologies, the commercial arm of the Jerusalem College of Technology. Based in Jerusalem, Israel, the...
Data Recovery Tools  Removable media recovery software recovers helps to restore lost digital files from various types of storage cards and drives. Utility can restore all types of data like images, videos, important TXT, XLS, PPT, XLSX...
<  1  2  3  4  5  6  11  18  >

Data Loss Prevention - Product Reviews

Data loss prevention software adding exciting new features: Reprogramming your employees is the next step

One of the newest data loss protection (DLP) software features is the ability to ask and receive an answer from your application programming interface (API) to the question “What is the user trying to copy?” DLP technology has had to evolve rapidly to keep up with new developments. In particular, ubiquitous wireless devices have opened up whole new avenues for data loss.  While companies spend huge amounts of money on hard- and software upgrades, education of the employees entrusted with these systems is often overlooked.

Companies lose data every day, often for easily avoidable reasons. While purchasing state-of-the-art data loss protection software should be your first line of defense, human behavior, a significant component of the problem, especially with regard to end-point losses, is not so easily controlled. Education of everyone who has access to your data base, both in- and outside your organization is essential to ensure that you get the maximum benefit from your DLP technology. Strict enforcement of a well crafted company security policy is the next brick in the wall. You cannot prevent experienced thieves from stealing company laptops in crowded airports, but you can make sure they will not be able to read the sensitive company material stored on the devise.


Best-in-Class Data Loss Protection Software Providers Feature:

  • Creation of comprehensive data flow and usage map to identify data leakage points in your company’s system.
  • Holistic solution that enables content awareness among all communication channels and all systems at all times.
  • Availability of features that monitor employee non-compliance with the company’s safety protocol, like pop-ups that notify users of unsafe practices with links to educational material on best practices.

Top Considerations Before Buying Data Loss Protection Software:

Each software application has different weaknesses and strengths. Once you have your data flow and usage map in hand, determine which leakage points in your system cause the most damage and make sure that the data loss protection software you purchase is particularly strong in that area. Remember to get everyone on board by educating both your employees and the staff in the other organizations that have links to your system on best practices and the importance of rigid enforcement of protocol.


Key Providers:

1. According to Sendmail, Inc., they were responsible for launching the electronic mail market over 25 years ago. Open Source Mail Transfer Agent (MTA) heralded in the game-changing technology of internet mail and global electronic message interconnectivity. Sendmail’s appliance-based products, applications, and services allow businesses to apply their own policy-based approach to message management, including data loss prevention. Sendmail has its headquarters in Emeryville, CA. Sales and support offices in the Americas, Europe and Asia handle its overseas operations.

2. Netronome Systems supplies programmable semiconductor products for intelligent flow processing by tightly integrated network flow processors and acceleration cards used in  communications products and virtualized servers. A global network of universities, government agencies and private companies is performing research using its microengine processing solutions.  Netronome, founded in 2003, has headquarters in Pittsburgh, Pennsylvania, core operations in Santa Clara, California and Boxborough, Massachusetts, and international operations in the United Kingdom, China and South Africa..

3. Absolute Software provides management and security services to businesses to help them optimally manage their mobile devises such as computers, netbooks and smartphones. In 2009, Absolute earned ISO/IEC 27001 Information security management certification for its IT security services. Remote deletion of data located on stolen computers, together with the ability to track and recover these devices, are some of the services offered by this Vancouver, Canada-headquartered company. Regional offices in Austin, Texas and Newbury, England have enabled it to reach a wider market.

4. Linking Sun Microsystems' server, storage, operating-system, and virtualization technology with Oracle's integrated open architecture and multiple operating-system options made a wider range of IT solutions available to its customers. Oracle has developed the largest suite of business applications software currently available in the marketplace. According to the companies, they are able to seamlessly integrate every level of a company’s IT stack, resulting in better security, performance and value.

Data Loss Protection Software
Definition: Data Loss Prevention (DLP) also referred to as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF), Information Protection and Control (IPC) or Extrusion Prevention System are systems that detect and prevent unauthorized use and transference of confidential information by tracking data in use, in motion and at rest within a centralized management framework.

More

Data Loss Prevention Research Library

Information Security & Data Loss Prevention
WebSpy
Information Security: Data Loss Prevention This document examines the possible threat and effect of data loss. It includes methods designed to prevent data loss and enhance system security and how WebSpy software can be used to prevent data loss and protect your organization. This document is intended as a guide only. It aims to introduce the reader to issues that may be relevant to their ...
 
Getting Started with McAfee Host Data Loss Prevention
McAfee, Inc.
Though external threats and attacks remain a major concern for CIOs and CSOs, loss of the company’s most valued data often is the result of insider actions. Some of these actions are intentional and malicious, but the larger percentage is accidental and unintended, the result of employees’ ignorance about data protection policies or their willingness to skirt policies in order to work more ...
 
Managed File Transfer:  When Data Loss Prevention (DLP) Is Not Enough
Coviant Software
Data Loss Prevention (DLP) products can identify high-risk network traffic that requires intervention using a Managed File Transfer (MFT) solution to reduce your business risk. Managed File Transfer products enforce security policies, provide visibility and monitoring of ongoing transmissions, collect data for internal and external audits, and integrate with your current DLP solutions and other ...
 
Prevent Data Loss and Comply With PCI Data Security Standards
Websense, Inc.
Modern commerce relies heavily on credit card transactions, providing convenience to consumers and more sales opportunities for merchants. With vast amounts of financial capital transferring via these means, it’s no wonder that credit card fraud amounts to over a billion dollars in the US alone, according to the US Treasury. The Payment Card Industry Data Security Standards (PCI DSS) were ...
 
Mitigating the Risk of Mobile Data Loss on iOS Apr2012
MobileIron
Mitigating the Risk of Mobile Data Loss on iOS Corporate data has moved to the mobile device. Mobile IT professionals need to mitigate the risk of data loss by extending data loss prevention programs, compensating controls, and employee education initiatives to include mobile devices. Even the well-intentioned insider still needs to be educated and continually reminded of his or her ...
 

Data Loss Prevention Video

Managed File Transfer: Challenges and Solutions Coviant Software Real-world examples of how Diplomat Managed File Transfer streamlined file transfer processes by improving automation, integration and control of secure ...
 
About SpamTitan - How to effectively block Spam SpamTitan This video is an overview of SpamTitan, a highly effective anti spam engine which guarantees protection from spam, viruses, Trojans, phishing attacks and ...
 
Data Loss Prevention InterMapper, A Division of HelpSystems Products

Data Loss Prevention News

Data Loss Prevention Peripheral Manufacturing, Inc. Technology
Data Loss Prevention IBS America, Inc Technology
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.