IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityMultimedia (View All Report Types)
1 - 25 of 239 Matches Previous Page  | Next Page
Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Leveraging Secure File Sync & Share to Enable Enterprise Productivity
sponsored by Code42
WEBCAST: In this webinar, Alan Pelz-Sharpe, Research Director of Social Business at 451 Research, discusses how organization successfully deploy sync/share solutions and how IT leverages them for increased efficiency.
Posted: 20 Oct 2014 | Premiered: Oct 20, 2014

Code42

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Archive Manager for HP ALM Data
sponsored by Avnet
VIDEO: This video introduces Avnet Archive Manager, a software solution that allows you to archive ALM data on a static archive and retrieval platform that is fully compliant with important regulations.
Posted: 14 Oct 2014 | Premiered: 18 Sep 2014

Avnet

Security Assessment Team Helps Hospital Revamp their Security Infrastructure
sponsored by CDW Corporation
VIDEO: Find out what a security assessment team found after evaluating a hospital's security infrastructure, policies and procedures.
Posted: 02 Oct 2014 | Premiered: 02 Oct 2014

CDW Corporation

The Increasing Value of Data in Australia: Privacy, Security and Compliance
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how 150 other organizations are evolving in terms of data management. You'll also learn about new technologies as well as areas where organizations are still frequently exposed to risks.
Posted: 01 Oct 2014 | Premiered: 03 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

A New Blade Server Solution Built to Optimize Storage
sponsored by Dell, Inc. and Intel®
VIDEO: View this video to explore the features and benefits of a compact, half-height blade server that's an excellent platform for your key workloads. You'll learn how this solution provides an array of storage options that enhance data protection and optimize performance while meeting the growing demands of your data center.
Posted: 01 Oct 2014 | Premiered: 07 Sep 2014

Dell, Inc. and Intel®

Hitachi Solutions for Data Protection
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how Hitachi solutions for Data Protection address the challenges presented by exponential data growth and server virtualization. This demo also explains how Hitachi's unique approach leverages replication, backup and archive to overcome the most pressing data center challenges.
Posted: 30 Sep 2014 | Premiered: 23 Oct 2012

NTT Communications ICT Solutions and Hitachi Data Systems

Examine the Increasing Value of Data
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: In this video, Julian Badell from NTT ICT and Andrew McGee from Hitachi Data Systems have been interviewed by Sky News Business on the responsibilities of data custodianship and how organizations are handling this new currency. View now to learn how new privacy laws are changing the way organizations handle their data.
Posted: 30 Sep 2014 | Premiered: 14 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

Meet the N-able product family
sponsored by N-able Technologies
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

N-able Technologies

Staying Compliant and Secure in the Cloud Era
sponsored by CipherCloud
WEBCAST: This webcast reveals what it takes to stay compliant and protected in the age of the cloud.
Posted: 22 Sep 2014 | Premiered: Mar 10, 2014

CipherCloud

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Big Ideas; Big Tech: Meeting DBA and Application Owner Challenges with EMC
sponsored by EMC Corporation
WEBCAST: Backup and recovery has become an essential element of data protection.  Information is useless if customers, employees, or business partners can't access it when they need to.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

Big Ideas, Big Tech: Tackling Oracle Backup in the Face of Massive Data Growth
sponsored by EMC Corporation
WEBCAST: As the criticality and quantity of data continues to grow, the gap between DBA and the Backup Administrator increase further. DBAs want to rely on their own backup rather than waiting for an administrator, while administrators complete tasks in the most efficient way possible.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Avoid a Data Breach with Help from Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA, The Security Division of EMC
1 - 25 of 239 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement