Data Loss Protection: High-impact Strategies - What You Need to Know : Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

ISBN
9781743045558
$39.95
Author Roebuck, Kevin
Format Paperback
Details
  • Active Record
  • Individual Title
  • Yes
Data Loss Protection (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination and so on) and with a centralized management framework. Systems are designed to detect and prevent unauthorized use and transmission of confidential information Vendors refer to the term as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF), Information Protection and Control (IPC) or Extrusion Prevention System by analogy to Intrusion-prevention system. This book is your ultimate resource for Data Loss Protection. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Data Loss Protection right away, covering: Data loss, Data, Data (computing), Synthetic data, 12-bit, 18-bit, 2009 Sidekick data loss, AS3 (networking), Attribute (computing), Binary code, Bubble Babble, Change data capture, Common Source Data Base, Compressed pattern matching, Computer data processing, Continuous data protection, Data architecture, Data consistency, Data efficiency, Data recovery, List of data recovery software, Data Reference Model, Data retention, Data set, Data source, Data syncretization, DataPortability, Default (computer science), Dynamic data, Electronic Data Interchange, Electronically stored information (Federal Rules of Civil Procedure), Fall back and forward, Fuzzy backup, Garbage (computer science), Header (computing), Hex editor, JBOB, KLV, Leading zero, Lilian date, Line (text file), Log trigger, Machine-generated data, Persistent data, Photo recovery, Precision (computer science), Random access, Recycle bin (computing), Sector slipping, Seed loading, Sensor fusion, Sequential access, Source data, Stream (computing), Termcap, Terminal value (computer science), Text file, Thunk, Trailer (computing), Value (computer science), WinHex, AutoVirt, CopyCatX, Data storage tag, Dd (Unix), DriveSavers, DTI Data, Dvdisaster, File carving, FileSalvage, GetDataBack, Open Computer Forensics Architecture, PhotoRec, Recuva, SalvageData, ShadowProtect, Software architecture recovery, SpinRite, SystemRescueCD, TestDisk, Trinity Rescue Kit, Undeletion This book explains in-depth the real drivers and workings of Data Loss Protection. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Loss Protection with the objectivity of experienced professionals.