IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
151 - 175 of 208 Matches Previous Page  |  Next Page
CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

CA ARCserve Backup r12.5 Disaster Recovery
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 disaster recovery tools. This video offers detailed instructions on this solution's functionality.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

CA ARCserve Backup r12.5 Technical Video Series: Overview
sponsored by arcserve
VIDEO: Watch this video for a demonstration of the comprehensive offerings of CA ARCserve Backup r12.5. This video shows how the architecture is designed, how the product works, and how to use the tools.
Posted: 27 May 2010 | Premiered: 27 May 2010

arcserve

Quantum Interactive Classroom: Dedupe for Backup
sponsored by Quantum Corporation
VIRTUAL SEMINAR: This interactive classroom features exclusive expert content designed to get IT administrators up to speed on deduplication. The classroom includes a video that explores the different types of deduplication and how these technologies help IT pros optimize and enhance already existing storage infrastructures. 
Posted: 25 May 2010 | Premiered: 25 May 2010

Quantum Corporation

Ontrack® PowerControls™ 6.0
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
SOFTWARE DEMO: Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.
Posted: 17 May 2010 | Premiered: 17 May 2010

Ontrack® PowerControls™ by Kroll Ontrack

Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

BlackBerry® Client for IBM® Lotus® Connections or BlackBerry® Client for IBM® Lotus® Quickr™
sponsored by BlackBerry
SOFTWARE DEMO: Help mobile workers access the information and expertise needed to remain productive while on the go. 
Posted: 12 May 2010 | Premiered: 12 May 2010

BlackBerry

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

Protecting Lost or Stolen PCs
sponsored by Intel
VIDEO: Learn more about how the all new Intel® Core™ vPro™ processor family can better protect lost or stolen PCs.
Posted: 27 Apr 2010 | Premiered: 22 Apr 2010

Intel

Webinar: Autoscaling Server Arrays
sponsored by RightScale
WEBCAST: This webinar focuses on how the RightScale Platform handles autoscaling with specific instructions and a live demo.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

PCI Compliant Yesterday. Still Compliant Today?
sponsored by Tripwire, Inc.
WEBCAST: This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
Posted: 29 Jan 2010 | Premiered: Jan 29, 2010

Tripwire, Inc.

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett-Packard Company
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett-Packard Company

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

The Malware Report: Hotel Business Center PCs Strike Again
sponsored by ESET
PODCAST: Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely.
Posted: 29 Oct 2009 | Premiered: Aug 20, 2009

ESET

The Malware Report: Radisson Hotels Exposed by Guest Data Breach
sponsored by ESET
PODCAST: Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened.
Posted: 29 Oct 2009 | Premiered: Sep 23, 2009

ESET

Get More Virtual: Protecting Microsoft Applications with Dell and VMware vSphere 4
sponsored by Dell, Inc.
WEBCAST: Watch this webcast to learn how to ensure application security and availability in your VMware environment. Discover how to provide quick recovery of applications and how to use automation for server application protection.
Posted: 20 Oct 2009 | Premiered: Oct 20, 2009

Dell, Inc.

Data Protection for Virtual Environments Webcast
sponsored by Quantum Corporation
WEBCAST: In this webcast, Greg Schulz, Founder and Senior Analyst at The StorageIO Group, and Randy Glissman, Solutions Marketing Manager at Quantum, explore solutions for virtual server data protection and discuss general data center trends and perspectives.
Posted: 22 Sep 2009 | Premiered: Sep 21, 2009

Quantum Corporation

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection
sponsored by IBM
WEBCAST: In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts.
Posted: 17 Sep 2009 | Premiered: Sep 24, 2009, 12:00 EDT (16:00 GMT)

IBM

The Executive Guide to Data Loss Prevention
sponsored by Websense, Inc.
VIDEO: Rich Mogull of Securosis answers the question, What is Data Loss Prevention (DLP)? In this videocast he discusses how DLP benefits business and shows examples of DLP usage in the real world.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

Websense, Inc.

Data Protection for Virtual Environments
sponsored by Quantum Corporation
WEBCAST: Please join this webcast as Randy Glissmann, Solutions Marketing Manager, Quantum, explains Quantum solutions for virtual server data protection. Greg Schulz, Founder and Sr. Analyst – The StorageIO Group and author of "Resilient Storage Networks" and "The Green and Virtual Data Center," will also be speaking.
Posted: 20 Aug 2009 | Premiered: Sep 26, 2008

Quantum Corporation

Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST: This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009

Dell Software
151 - 175 of 208 Matches Previous Page    5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement