Data loss prevention software

Results: 147



#Item
1Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:08
2Report  Grand Theft Data Data exfiltration study: Actors, tactics, and detection

Report Grand Theft Data Data exfiltration study: Actors, tactics, and detection

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-09-22 16:22:57
3DATA LEAKS  Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-18 10:57:52
4Integration with Data Loss Prevention (DLP) Controlled Document Collaboration with DLP Remediation and Discovery

Integration with Data Loss Prevention (DLP) Controlled Document Collaboration with DLP Remediation and Discovery

Add to Reading List

Source URL: info.watchdox.com

Language: English - Date: 2015-07-18 21:16:44
5InterGuard - DATA LOSS PREVENTION  Data Loss Prevention InterGuard’s patented technology blocks confidential data from leaving the organization via email, email attachments or USB devices such as flash memory sticks. I

InterGuard - DATA LOSS PREVENTION Data Loss Prevention InterGuard’s patented technology blocks confidential data from leaving the organization via email, email attachments or USB devices such as flash memory sticks. I

Add to Reading List

Source URL: www.adm-tools.com

Language: English - Date: 2015-03-19 10:55:06
6FileOpen and Data Loss Prevention Sanford Bingham November 2009 The high and increasing percentage of every organization’s information assets that are created and distributed in digital form creates an ever-growing ris

FileOpen and Data Loss Prevention Sanford Bingham November 2009 The high and increasing percentage of every organization’s information assets that are created and distributed in digital form creates an ever-growing ris

Add to Reading List

Source URL: www.actino.com

Language: English - Date: 2013-04-03 09:57:30
7Wave Protector  Port & Device Control and Removable Media Encryption p  Protect your enterprise from data leakage and theft

Wave Protector Port & Device Control and Removable Media Encryption p Protect your enterprise from data leakage and theft

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:01
8AirWatch - Mobile Content Management

AirWatch - Mobile Content Management

Add to Reading List

Source URL: www.we-conect.com

Language: English - Date: 2015-02-12 19:15:50
9Wave Data Protection Suite Complete Visibility, Control and Protection Adhere to regulatory data security and privacy standards  Maintain optimal balance

Wave Data Protection Suite Complete Visibility, Control and Protection Adhere to regulatory data security and privacy standards Maintain optimal balance

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:08:54
10Wave Auditor  Comprehensive Endpoint Visibility Auditor – immediately recognize security risks by identifying WiFi ports or devices

Wave Auditor Comprehensive Endpoint Visibility Auditor – immediately recognize security risks by identifying WiFi ports or devices

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:50