IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
1 - 25 of 1307 Matches Previous Page  | Next Page
An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

World-Class IaaS Provider CloudSigma Runs on Micron SSDs
sponsored by Micron Technology
WHITE PAPER: This white paper details how to securely erase data using SSDs.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Micron Technology

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9, Inc.
WHITE PAPER: This helpful white paper outlines 5 steps for reducing the complexity of PCI assessments, lowering administration costs, and accelerating the attainment of a compliant and secure environment.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER: This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014

SafeNet, Inc.

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Defeat Malware and Botnet Infections with a DNS Firewall
sponsored by BlueCat
WHITE PAPER: This paper reveals a threat protection solution that can help you address any holes in enterprise security.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

BlueCat

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Hightail for Enterprise: Security Overview
sponsored by Hightail
WHITE PAPER: This white paper outlines how Hightail can keep files secure, even with unsanctioned sharing tools.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

4 Best Practices for Building PCI DSS Compliant Networks
sponsored by SolarWinds, Inc.
WHITE PAPER: This white paper reveals four recommendations for building PCI DSS compliant networks to secure consumer's payment card data.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

SolarWinds, Inc.

Protection for Every Enterprise: How BlackBerry® Security Works
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Building the Business Case for Mobile Communications
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

The Case for Mobile Medical Communications
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by CommVault
WHITE PAPER: This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

How Box is Securing Business Information in the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Top Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC Isilon
WHITE PAPER: This whitepaper lists the five top reasons to choose EMC Isilon for video surveillance.
Posted: 02 Dec 2014 | Published: 31 Aug 2014

EMC Isilon

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Security and Compliance for Scale-Out Hadoop Data Lakes
sponsored by EMC Isilon
WHITE PAPER: This whitepaper explains in detail how this scale-out NAS storage system provides a multiprotocol data lake that secure Hadoop data.
Posted: 02 Dec 2014 | Published: 31 Aug 2014

EMC Isilon
1 - 25 of 1307 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement