IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
126 - 150 of 1350 Matches Previous Page  | Next Page
Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Best Practices Guide: Tools for Threat Intelligence and Incident Forensics
sponsored by DomainTools
WHITE PAPER: In this white paper, discover a suite of tools that can be used to identify the perpetrator of a cybercrime, build a profile of a cyber-attack, and proactively protect your data, infrastructure, and intellectual property.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

How to Stop Advanced Attacks using Big Data and Behavioral Analytics
sponsored by RSA
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Lumension 2014 Data Protection Maturity Report
sponsored by Lumension
WHITE PAPER: This report focuses on top security trends for 2014 and reveals the best practices for safeguarding sensitive information.
Posted: 26 Aug 2014 | Published: 30 Jan 2014

Lumension

Inform e-Book Summer 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive resource examines the latest and greatest in the world of IT security, including in-depth reports on advanced malware, security case studies, industry insider interviews, and more.
Posted: 26 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Reduce Security Breaches and Manage Risk with a Fax Security Strategy
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: Inside this informative white paper, explore a new Enterprise Mobility Management (EMM) solution which makes it easy to create, manage, and secure apps on any device.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 19 Aug 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited
126 - 150 of 1350 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement