IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityMultimedia (View All Report Types)
1 - 25 of 236 Matches Previous Page  | Next Page
Big Ideas; Big Tech: Meeting DBA and Application Owner Challenges with EMC
sponsored by EMC Corporation
WEBCAST: Backup and recovery has become an essential element of data protection.  Information is useless if customers, employees, or business partners can't access it when they need to.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

Big Ideas, Big Tech: Tackling Oracle Backup in the Face of Massive Data Growth
sponsored by EMC Corporation
WEBCAST: As the criticality and quantity of data continues to grow, the gap between DBA and the Backup Administrator increase further. DBAs want to rely on their own backup rather than waiting for an administrator, while administrators complete tasks in the most efficient way possible.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

A10 Networks' Advanced Core Operating System (ACOS)
sponsored by A10 Networks
VIDEO: Tune into the following video to discover how A10 Networks ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security of their data center applications and networks.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

A10 Networks

Simplify Your HIT Needs
sponsored by CommVault Systems, Inc.
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013

CommVault Systems, Inc.

Beth Israel Utilizes Lifecycle Management Solution to Keep Data Safe
sponsored by CommVault Systems, Inc.
VIDEO: Find out which lifecycle management solution Beth Israel utilizes to keep its data safe.
Posted: 10 Sep 2014 | Premiered: 22 Feb 2013

CommVault Systems, Inc.

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn

Keys to a Successful BCM Program
sponsored by RSA, The Security Division of EMC
WEBCAST: Watch to discover how a centralized, automated approach to business continuity and disaster recovery planning allows you to respond swiftly in a crisis to protect your operations with the RSA Archer Business Continuity Management solution.
Posted: 05 Sep 2014 | Premiered: Sep 4, 2014

RSA, The Security Division of EMC

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Preventing Data Breaches with Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA, The Security Division of EMC

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

See what Security, Reliability and Efficiency looks like
sponsored by IBM and Intel.
WEBCAST: Tune in to this exclusive webcast to hear industry veterans examine a new server system that uses innovative new technology to provide enterprise-class data protection.
Posted: 26 Aug 2014 | Premiered: Sep 8, 2014

IBM and Intel.

Secure Mobile Devices without Restricting Users
sponsored by Bluebox
VIDEO: In this informativevideo, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 20 Aug 2014 | Premiered: 05 Mar 2014

Bluebox

What Does the Future Hold for Managed File Transfer?
sponsored by IBM
WEBCAST: This webcast investigates the future of managed file transfer due to the evolving digital universe.
Posted: 15 Aug 2014 | Premiered: Aug 15, 2014

IBM

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

10 Questions CISOs Should Ask About Mobile Security
sponsored by Bluebox
WEBCAST: This webcast reveals the answers to 10 questions CISOs should ask about mobile security.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

The Key to Ensuring Endpoint Data Privacy in the Cloud
sponsored by Druva Software
WEBCAST: This webcast provides encryption key management schemes, designed for the cloud so your organization is ensured endpoint data privacy in the cloud. Watch now and also find out key considerations for selecting cloud backup.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Druva Software

A New Approach to Endpoint Data Protection
sponsored by Druva Software
WEBCAST: Watch this informative webcast for considerations to keep in mind when choosing a data protection solution. Also find out the benefits of an integrated solution that solves for both data protection and governance needs.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:03 EDT (05:03 GMT)

Druva Software

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
PODCAST: Tune in to this informative podcast to gain crucial information about managed security solutions, and how they can help you monitor threats and prevent data breaches in your enterprise.
Posted: 13 Aug 2014 | Premiered: Aug 5, 2014

NEC Corporation of America

Secure Communications and Care Coordination in Healthcare
sponsored by Imprivata
WEBCAST: Tune into this webcast to experience how mobility is drastically changing the way clinicians deliver patient care.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

Imprivata

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.
1 - 25 of 236 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement