IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 218 Matches Previous Page  |  Next Page
PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

Extend Your Identity Management Services to the Cloud
sponsored by Oracle Corporation
WEBCAST: Access this webcast to learn how to extend Identity Management Services to the cloud, automating SaaS account provisioning, enabling single sign-on and providing detailed activity reports for today's customers.
Posted: 13 May 2015 | Premiered: May 13, 2015

Oracle Corporation

Maximizing the Efficiency of a Loan's Lifecycle
sponsored by Nuance
VIDEO: Manual, paper-based loan processes expose banks to longer delays, errors, and customer attrition. This featured video lays out concerns and strategies to leverage financial institutions' most critical process. Discover the benefits of expediting loans with collaborative technologies.
Posted: 13 May 2015 | Premiered: 23 Mar 2015

Nuance

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST: This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014

Absolute Software

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Five Design Principles of an Effective Endpoint Security Strategy
sponsored by Absolute Software
WEBCAST: Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.
Posted: 06 May 2015 | Premiered: Sep 17, 2014

Absolute Software

Compliance Penalties + Class Action Damages = Healthcare Budget Crisis
sponsored by Absolute Software
WEBCAST: Examines the cost of a breach in the healthcare sector and why you need to go beyond encryption to protect your organization. View this webcast now for strategies to limit the exposure of your organization to security risks.
Posted: 05 May 2015 | Premiered: Mar 19, 2014

Absolute Software

An Inside Look at the Azure Active Directory
sponsored by Microsoft
VIDEO: In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD
Posted: 01 May 2015 | Premiered: 01 May 2015

Microsoft

Big Data Governance and Metadata Management
sponsored by Oracle Corporation
WEBCAST: View this webcast to learn how you can step up your data systems and manage Big Data effectively.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Oracle Corporation

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Device and Data Protection - Part 3
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO: In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015

IBM

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webcast, discover the six key steps you need to take to optimize your SIEM use.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

Compliance Does Not Equal Security: Risk-Based Plan for ePHI Protection
sponsored by HP Security Voltage
WEBCAST: View this in depth webcast to learn how to establish a security-based strategy for data protection and how you can meet and go beyond healthcare regulation requirements. Watch now to learn more.
Posted: 03 Apr 2015 | Premiered: Aug 20, 2014

HP Security Voltage

Is Dealing with Malware Like Finding Needles in Your Enterprise Haystack?
sponsored by Veracode, Inc.
WEBCAST: View this in-depth webinar and learn how to fortify your mobile device strategy, as hackers target mobile networks and devices. Get details on poignant topics, including how to find risks manually.
Posted: 03 Apr 2015 | Premiered: Sep 29, 2013

Veracode, Inc.

Understanding Today’s Global Privacy Requirements for Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Access this webinar to learn about changes in data privacy laws.
Posted: 02 Apr 2015 | Premiered: Apr 2, 2015

Druva Software

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions
1 - 25 of 218 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement