IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
101 - 125 of 1224 Matches Previous Page  |  Next Page
All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

There’s Never Been a Better Time to Virtualize
sponsored by VMware
WHITE PAPER: Access this white paper to learn more about the benefits of server virtualization. You'll learn about the benefits you can expect with virtualization, including, cost savings, streamlined manageability, maximized uptime, improved business continuity and security, and more.
Posted: 11 Nov 2014 | Published: 30 Jun 2014

VMware

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Safeguard Business-Critical Resources with a Comprehensive Imaging and Printing Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

One Size Never Fits All: Optimizing your Organization with Backup Built for Your Business
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines why the "one-size-fits-all" may not be the best approach for data backup and how it can potentially cause IT departments to over-pay or under-protect. You'll also learn about a data protection platform that provides uniquely tailored tools for physical, virtual and cloud workloads across almost any OS environment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

Strangers in Your Servers: Make Working with IT Contractors More Secure
sponsored by ObserveIT
WHITE PAPER: Access this white paper to learn about a solution that keeps an eye on users consistently.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

How to Make Virtual Hybrid Cloud Backup Easy
sponsored by Datto, Inc.
WHITE PAPER: This whitepaper examines an end-to-end backup solution that combines appliance hardware, lightweight backup agents and a remote, off-site cloud backup storage facility to provide businesses with full disaster recovery situations.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Datto, Inc.

Scale-out systems that put data to work
sponsored by IBM
WHITE PAPER: This resource highlights a solution that is the first generation of systems with processors designed for Big Data.
Posted: 31 Oct 2014 | Published: 17 Apr 2014

IBM

Analyst Report: Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: Security pros can't adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the organization, and who can use it. In this Forrester Research, Inc. report, discover a data security and control framework that will help you adapt to the new data economy.
Posted: 29 Oct 2014 | Published: 01 Oct 2014

IBM

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015

SecureAuth

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

Cloud Deployment with Enterprise Endpoint Backup and File Sync/Share
sponsored by Code42
WHITE PAPER: Read this white paper to find out about a solution that allows organizations to select their preferred cloud deployment strategy while providing enterprise endpoint backup and file sync and share to meet industry standards for data security.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

What is the Dynamic Data Center?
sponsored by CA Technologies.
WHITE PAPER: Access this brief resource to learn how you can get on the path to a dynamic data center. You'll learn about System z, which provides central management of security, governance, cloud services, big data, and predictive analytics.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CA Technologies.

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Lower Risk and Cost with Proactive Information Governance
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how to ensure that your data assets are available, protected and managed through their entire lifecycle.
Posted: 20 Sep 2014 | Published: 12 Feb 2014

Hewlett-Packard Company

How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014

Rackspace

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a threat-centric security strategy that provides superior visibility, continuous control, and advanced threat protection– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
101 - 125 of 1224 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement