IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityMultimedia (View All Report Types)
1 - 25 of 226 Matches Previous Page  | Next Page
Secure Mobile Devices without Restricting Users
sponsored by Bluebox
VIDEO: In this informativevideo, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 20 Aug 2014 | Premiered: 05 Mar 2014

Bluebox

What Does the Future Hold for Managed File Transfer?
sponsored by IBM
WEBCAST: This webcast investigates the future of managed file transfer due to the evolving digital universe.
Posted: 15 Aug 2014 | Premiered: Aug 15, 2014

IBM

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

10 Questions CISOs Should Ask About Mobile Security
sponsored by Bluebox
WEBCAST: This webcast reveals the answers to 10 questions CISOs should ask about mobile security.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

For your eyes only: Endpoint data privacy in the cloud
sponsored by Druva Software
WEBCAST: This webcast provides encryption key management schemes, designed for the cloud so your organization is ensured endpoint data privacy in the cloud. Watch now and also find out key considerations for selecting cloud backup.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Druva Software

A New Approach to Endpoint Data Protection
sponsored by Druva Software
WEBCAST: Watch this informative webcast for considerations to keep in mind when choosing a data protection solution. Also find out the benefits of an integrated solution that solves for both data protection and governance needs.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:03 EDT (05:03 GMT)

Druva Software

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
PODCAST: Tune in to this informative podcast to gain crucial information about managed security solutions, and how they can help you monitor threats and prevent data breaches in your enterprise.
Posted: 13 Aug 2014 | Premiered: Aug 5, 2014

NEC Corporation of America

Secure Communications and Care Coordination in Healthcare
sponsored by Imprivata
WEBCAST: Tune into this webcast to experience how mobility is drastically changing the way clinicians deliver patient care.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

Imprivata

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Storage Solution Case Study: BMO Harris Bank Saves $5 Million Per Year
sponsored by EMC Corporation
WEBCAST: This video explains how BMO Harris Bank found a storage solution with easy access that provided them with immediate savings of $5 million a year. Watch to find out how you can deploy the same solution with an easy to use interface and quickly lower costs.
Posted: 29 Jul 2014 | Premiered: Jul 29, 2014

EMC Corporation

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

How to easily configure antivirus policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.
Posted: 10 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Stay in Control of Critical Data with GFI Cloud
sponsored by GFI Cloud
VIDEO: Access this video for a product tour of a solution that offers IT management, monitoring, and security capabilities.
Posted: 09 Jul 2014 | Premiered: 10 Oct 2013

GFI Cloud

Podcast: Avoid the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by CommVault Systems, Inc.
PODCAST: This podcast delivers advice and insight from two experts in the field regarding the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 08 Jul 2014 | Premiered: Jul 2, 2014

CommVault Systems, Inc.

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

Next Gen Big Data – Extending IBM Big Data and Analytics Offerings in the Cloud
sponsored by IBM.
WEBCAST: Find out how IBM's Big Data & Analytics solutions enable the creation of insight-driven web and mobile applications with real-time decision making with help from big data.
Posted: 03 Jul 2014 | Premiered: Jul 16, 2014

IBM.

HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation
1 - 25 of 226 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement