IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1210 Matches Previous Page  |  Next Page
Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

IAM Buyers Guide: How to Evaluate and Choose the Right Platform
sponsored by IBM
WHITE PAPER: Access this resource and explore the IAM buyer's guide.  Discover how to evaluate and choose a solution to protect your organization's data
Posted: 25 Feb 2015 | Published: 11 Jun 2014

IBM

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Case Study: Essent deployes API Gateway
sponsored by Axway
WHITE PAPER: Essent, the largest energy company in the Netherlands, needed to provide an easy-to-use, secure, robust, and proven system to enable web services and mobile applications for customers, partners, employees, and the general public. Access this case study to find out which API platform Essent deployed to govern the flow of data on the edge.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Axway

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

Achieving Effective Information Governance: Cut Storage and Discovery Costs and Help Reduce Risk
sponsored by IBM
WHITE PAPER: Learn how you can achieve effective information governance to cut storage and discovery costs and help reduce risk.
Posted: 18 Feb 2015 | Published: 31 Oct 2014

IBM

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Top Enterprise Mobile Security Issues
sponsored by BlackBerry
WHITE PAPER: In this expert guide, Kathleen Richards and Robert Westervelt parse the results of an informative SearchSecurity.com survey that elucidates the mobile security issues continuing to mount in enterprises today.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

BlackBerry

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Printers Can Do More than Ever – Including Invite Hacks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company

Implement a Proactive Strategy for Data Security
sponsored by IBM
WHITE PAPER: Access this white paper to learn the 5 key findings of a recent Forrester study that evaluated data security decision-making by security buyers and influencers, and what it means to engage in proactive data security and privacy efforts.
Posted: 10 Feb 2015 | Published: 30 Sep 2014

IBM

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Cyber Security Oversight for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This valuable white paper gives detailed information about the security risks CEOs face and what they can do to ensure that their enterprise is being taken care of.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

LogRhythm, Inc.

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

The Effectiveness of a SIEM System According to IT Professionals
sponsored by IBM
WHITE PAPER: The following document profiles how IT professionals rate one possible SIEM solution.
Posted: 05 Feb 2015 | Published: 28 Feb 2014

IBM

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Ratings and Rankings for Security Forensics Tools
sponsored by IBM
WHITE PAPER: The following report reviews and rates seven security analytics programs, revealing which tools have been proven to reduce false positives and detect threats quickly and accurately.
Posted: 05 Feb 2015 | Published: 01 Jul 2014

IBM

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Preventing Data Breaches Made Possible with Data Breach Discovery
sponsored by BitGlass
WHITE PAPER: Consult the following white paper to learn how by using proprietary risk intelligence and Big Data analytics, the Data Breach Discovery system by Bitglass can offer a formidable defense against new age data breaches.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass
1 - 25 of 1210 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement