IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1289 Matches Previous Page  |  Next Page
Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Dissecting the Foundation of an Adaptive Data Loss Prevention Strategy
sponsored by Clearswift
WHITE PAPER: This white paper reveals the foundation of adaptive data loss prevention strategy.
Posted: 26 May 2015 | Published: 30 Apr 2015

Clearswift

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

Cybersecurity 101: What Coporate Boards Should be Doing
sponsored by Trend Micro
WHITE PAPER: Download and discover how executives can start making a significant impact on enterprise cybersecurity, ensuring that valuable enterprise data is safe from hackers.
Posted: 26 May 2015 | Published: 26 Sep 2014

Trend Micro

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.
Posted: 22 May 2015 | Published: 31 May 2014

IBM

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Replacing Legacy Enterprise Backup In the Mobile World
sponsored by Druva Software
WHITE PAPER: Follow four companies through the vendor selection process of modern endpoint backup solutions. You'll see how different providers compare on factors like performance, ease of management, scalability, and usability.
Posted: 22 May 2015 | Published: 30 Apr 2015

Druva Software

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

Preparing for The New World of Data Privacy: What Global Enterprises Need to Know
sponsored by Druva Software
WHITE PAPER: For senior IT leaders who are addressing data privacy concerns in their organizations, this paper covers the key issues to consider and gives recommendations for complying with data residency laws and protecting corporate and employee data privacy.
Posted: 21 May 2015 | Published: 21 May 2015

Druva Software

Content Collaboration: 5 Things to Look for in a Vendor
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper presents the 5 key features of a successful content collaboration software service that can help you improve your collaboration security without breaking the bank or complicating business processes.
Posted: 20 May 2015 | Published: 20 May 2015

IntraLinks, Inc

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Case Study: Cloud Content Management Investments
sponsored by Box
WHITE PAPER: This infographic depicts the anatomy of a decision for cloud content management investments. Learn about how one law firm successfully leveraged online connectivity to bring together a distributed team of attorneys occupying home and regional offices.
Posted: 20 May 2015 | Published: 20 May 2015

Box

File Sync and Sharing: When Collaboration Gets Complex
sponsored by Box
WHITE PAPER: Today's differing file sync and sharing (FSS) strategies cause decision-makers to scratch their heads. The following white paper explores the growing complexities of the FSS market. Discover key functionalities as you weigh various available offerings.
Posted: 20 May 2015 | Published: 31 Dec 2014

Box

Five Ways to Optimize Your Customer's Journey through the Contact Center
sponsored by Genesys
WHITE PAPER: In this white paper, discover the five steps you can take to make sure your customer's journey through your contact center is enjoyable from beginning to end.
Posted: 20 May 2015 | Published: 31 Dec 2014

Genesys

Expert Analysis: Enterprise File Synchronization and Sharing
sponsored by Box
WHITE PAPER: This study, conducted by Gartner research analysts, highlights significant changes that will impact users and providers in the EFSS sector. Less than 10% of today's EFSS vendors will offer standalone products by 2017, so get a headstart on your strategy and investigate up-and-coming capabilities.
Posted: 20 May 2015 | Published: 02 Jul 2014

Box

The State of Data Privacy in 2015: A Survey of IT Professionals
sponsored by Druva Software
WHITE PAPER: This Druva-sponsored study by Dimensional Research examines the importance of data privacy, challenges for IT in managing the privacy of sensitive business and customer data, and the impact of cloud technologies.
Posted: 20 May 2015 | Published: 30 Apr 2015

Druva Software

How to Streamline the Regulatory Filings Process
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores one approach to streamline the regulatory filing process, ensure granular control, and avoid penalties.
Posted: 19 May 2015 | Published: 29 Apr 2015

IntraLinks, Inc

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Top Marketing Data Collaboration Challenges
sponsored by IntraLinks, Inc
WHITE PAPER: In this whtie paper, discover the 6 data security and control challenges that marketing departments face and how to reduce risk and loss.
Posted: 15 May 2015 | Published: 06 May 2015

IntraLinks, Inc
1 - 25 of 1289 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement