Data Loss Prevention Whitepapers


Sort by: Date | Company | Title


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013
Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download
Download this now


Information Governance and Adaptive Redaction
By Clearswift Asia Pacific | 2/8/2013
In the past, protection used to come from Data Loss Prevention (DLP) solutions, which used content inspection and applied a rules set to whether the information can be sent outside the organisation. Today, Adaptive Redaction is the next generation of DLP technology which enables content to be modified automatically based on policy and permit constant collaboration with external organisations. Find out more about this insurance and how critical information doesn't have to be at risk.
Download this now


The Inevitable Extinction of PSTs
By Symantec.cloud | 12/2/2013
Some of the most common threats to mailboxes are viruses, spam, and hardware failures, but there is another, often overlooked culprit—PST files. This whitepaper discusses the problems that PSTs cause as well as a systematic approach for eliminating them. Read more.
Download this now


Why Encrypt? - Securing email without compromising communications
By Clearswift Asia Pacific | 31/7/2012
There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.
Download this now


The Need for Data Loss Prevention Now
By Clearswift Asia Pacific | 31/7/2012
For many years, organisations have noted that the network is the computer. With that, the network is the data, as data is the gold. Imagine if it occurred that 500 office chairs were stolen, with asset tags. Not really such a big deal, as they are insured. But if a few gigabytes of data are lost from an organisation that can often mean significant impact and consequences. Read more.
Download this now