IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityMultimedia (View All Report Types)
26 - 50 of 235 Matches Previous Page  | Next Page
Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

Secure Communications and Care Coordination in Healthcare
sponsored by Imprivata
WEBCAST: Tune into this webcast to experience how mobility is drastically changing the way clinicians deliver patient care.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

Imprivata

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

How to easily configure antivirus policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.
Posted: 10 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Stay in Control of Critical Data with GFI Cloud
sponsored by GFI Cloud
VIDEO: Access this video for a product tour of a solution that offers IT management, monitoring, and security capabilities.
Posted: 09 Jul 2014 | Premiered: 10 Oct 2013

GFI Cloud

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

Next Gen Big Data – Extending IBM Big Data and Analytics Offerings in the Cloud
sponsored by IBM.
WEBCAST: Find out how IBM's Big Data & Analytics solutions enable the creation of insight-driven web and mobile applications with real-time decision making with help from big data.
Posted: 03 Jul 2014 | Premiered: Jul 16, 2014

IBM.

HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

HP Simply StoreIT Virtualization Solution ChalkTalk
sponsored by HP and Intel
WEBCAST: This program makes choosing the right storage products easy. Your storage solutions will become simple to manage, affordable, and reliable. Click to watch a short video that provides ways to make data storage simpler.
Posted: 26 Jun 2014 | Premiered: Mar 28, 2014

HP and Intel

Enabling Collaboration: How IT Can Empower Users and Maintain Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

The Database Trifecta:  Simplified Management, Less Capacity, Better Performance
sponsored by Oracle and Intel®
WEBCAST: This webcast unveils the combination of hybrid columnar compression in Oracle databases. View now to learn the speed at which this technology runs database queries, and how it can help your data warehouses and data protection efforts.
Posted: 09 Jun 2014 | Premiered: Dec 31, 2013

Oracle and Intel®

Big Data Begins with Better Backup
sponsored by Symantec Corporation
VIDEO: This video gives insight into one vendor that specializes in maintaining existing infrastructures while complimenting it with Hadoop. This allows customers to bring in new technology without having to worry about lapses in data protection.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014

Clearswift

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Hardening Hadoop for the Enterprise
sponsored by WANdisco
WEBCAST: Prepare for Hadoop implementation with this knowledgeable webcast.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

WANdisco
26 - 50 of 235 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement