IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityMultimedia (View All Report Types)
26 - 50 of 226 Matches Previous Page  | Next Page
HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

HP Simply StoreIT Virtualization Solution ChalkTalk
sponsored by HP and Intel
WEBCAST: This program makes choosing the right storage products easy. Your storage solutions will become simple to manage, affordable, and reliable. Click to watch a short video that provides ways to make data storage simpler.
Posted: 26 Jun 2014 | Premiered: Mar 28, 2014

HP and Intel

Holistic Data Protection
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: The following digital classroom environment intends to help businesses achieve a holistic data protection procedure by providing the advice needed to successfully manage backup, archiving, mobile workforce, cloud infrastructure, and more.
Posted: 24 Jun 2014 | Premiered: 14 Mar 2014

CommVault Systems, Inc.

The Database Trifecta:  Simplified Management, Less Capacity, Better Performance
sponsored by Oracle Corporation
WEBCAST: This webcast unveils the combination of hybrid columnar compression in Oracle databases. View now to learn the speed at which this technology runs database queries, and how it can help your data warehouses and data protection efforts.
Posted: 09 Jun 2014 | Premiered: Dec 31, 2013

Oracle Corporation

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014

Clearswift

BYOD Happens: How to Secure Mobility
sponsored by Citrix
WEBCAST: View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.
Posted: 14 May 2014 | Premiered: May 14, 2014

Citrix

Modernizing offsite VMware, Hyper-V data protection: Time to get rid of your tapes
sponsored by Veeam Software
WEBCAST: This webinar highlights the difficulties of maintaining outdaed backup approaches. It also highlights the benefits of Veeam Backup and Replication, a solution that provides flexible, reliable and fast recovery of virtualized applications and data.
Posted: 06 May 2014 | Premiered: Apr 10, 2014

Veeam Software

Technical case study Steria and Veeam - three years later
sponsored by Veeam Software
WEBCAST: This case study highlights the partnership of Steria and Veeam. Together, they built a data center that could keep up with demands and manage big data in a complex, multitenant VMware vSphere environment.
Posted: 06 May 2014 | Premiered: Apr 15, 2014

Veeam Software

Select the right VMware, Hyper-V protection for a modern data center
sponsored by Veeam Software
WEBCAST: This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
Posted: 05 May 2014 | Premiered: Apr 17, 2014

Veeam Software

R UR DOCS TXTING?
sponsored by Imprivata
WEBCAST: This webcast, hosted by Ed Ricks, CIO of Beaufort Memorial Hospital, explains the compliance concerns with clinician text messaging, and shares Beaufort's experience implementing a secure, compliant solution that was able to reduce time wasted using communication technologies.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Imprivata

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Premiered: 10 Mar 2014

CommVault Systems, Inc.

PST Archiving: What is it and How is it Done?
sponsored by CommVault Systems, Inc.
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014

CommVault Systems, Inc.

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Big Data Begins with Better Backup
sponsored by Symantec Corporation
VIDEO: This video gives insight into one vendor that specializes in maintaining existing infrastructures while complimenting it with Hadoop. This allows customers to bring in new technology without having to worry about lapses in data protection.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Hardening Hadoop for the Enterprise
sponsored by WANdisco
WEBCAST: Prepare for Hadoop implementation with this knowledgeable webcast.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

WANdisco

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42
26 - 50 of 226 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement