IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
151 - 175 of 1119 Matches Previous Page  | Next Page
Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam
sponsored by Veeam Software
WHITE PAPER: Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime.
Posted: 16 Jan 2014 | Published: 31 Dec 2013

Veeam Software

Virtual Backup Strategies: Using Storage Snapshots for Backups
sponsored by Veeam Software
WHITE PAPER: Check out this informative white paper to find out how storage snapshots can be used as backups for virtual environments, and how it compares to one vendor's disk-to-disk backup solution.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Veeam Software

Aligning Your Business Needs with Veeam Backup & Replication
sponsored by Veeam Software
WHITE PAPER: Read through this in-depth white paper to find out how critical your data and systems are to your company, and how this vendor's backup and replication solution can provide you with superior data protection.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Veeam Software

Mazda Zooms-Zooms with Virtual Machine Backups in Half the Time
sponsored by Veeam Software
WHITE PAPER: Read this white paper to find out which backup and replication solution this well-known car manufacturing company selected to ensure their virtual data's safety.
Posted: 15 Jan 2014 | Published: 31 Jan 2011

Veeam Software

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Integrating Microsoft Technologies with an Identity and Access Management Solution
sponsored by OpenIAM
WHITE PAPER: In this whitepaper, learn how one comprehensive identity and access management (IAM) solution can be easily integrated with your existing Microsoft technologies, as well as non-Microsoft tools.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

OpenIAM

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

Humber River Hospital's Approach to Data Protection and Disaster Recovery
sponsored by BridgeHead Software
WHITE PAPER: In this case study, see how the Humber River Hospital consolidated their backup and archive solutions to improve data management and allow for rapid recovery time in order to keep up with increasing industry demands.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

BridgeHead Software

Samaritan Medical Center: CIOs Approach to Consolidating Hospital Data
sponsored by BridgeHead Software
WHITE PAPER: This case study on Samaritan Medical Center highlights their experience with a single, standardized data management platform, and how they were able to offer constant data availability even during disaster recovery. Click now to see how else they're benefiting.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

BridgeHead Software

Choosing a Cost Effective Medical Image Data Management Strategy
sponsored by BridgeHead Software
WHITE PAPER: In this case study, Gateshead Health NHS Foundation Trust implemented a vendor-neutral archive to localize their image data where easily accessible and kept protected from security issues. Click now to see how they're benefiting, and how this solution is designed to fit future EHR needs beyond imaging.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

BridgeHead Software

Extending Security Intelligence with Big Data solutions
sponsored by IBM
WHITE PAPER: Cybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals.
Posted: 24 Dec 2013 | Published: 31 Jan 2013

IBM

Rochelle Community Hospital Keeps a Healthy Storage Budget
sponsored by BridgeHead Software
WHITE PAPER: Access this case study to learn how Rochelle Community Hospital addressed their storage challenges by implementing a tiered backup and archive management system that efficiently secured data without breaking budget constraints.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

BridgeHead Software

Compliance Guide: Ensure Social Media Compliance Across Your Organization
sponsored by Hootsuite
WHITE PAPER: Whether you're in the financial, medical, or other industry, there are unique regulatory and legal requirements to consider when interacting on social media. In this informative resource, learn how a social relationship platform can help you manage all the areas of social media compliance,
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

Next-generation Firewalls Enable Secure Mobile Network Access
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

Security Guide: Deploying Social Media Securely on a Global Scale
sponsored by Hootsuite
WHITE PAPER: If your organization is looking to broaden the scope of social media programs, you've got to be prepared for several new security challenges. Creating new social media accounts means new opportunities for hackers, and more employees managing accounts on personal devices means more risk.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

The MDM advantage: Creating insight from big data
sponsored by IBM
WHITE PAPER: Ensuring your data is trustworthy and protected isn't simple, especially when you're dealing with the volume, variety, and velocity of big data. But you can't risk your end users placing confidence in untrustworthy information -- so what can you do?
Posted: 26 Dec 2013 | Published: 31 Jul 2013

IBM

Understanding big data so you can act with confidence
sponsored by IBM
WHITE PAPER: Ensuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?
Posted: 24 Dec 2013 | Published: 31 Jul 2013

IBM

Data protection for big data environments
sponsored by IBM
WHITE PAPER: Every organization is itching to harness the power and promise of big data, but ensuring the veracity and security of that information isn't easy. Traditional, manual methods of discovering and governing data often don't apply -- so how exactly do you ensure data protection for big data environments?
Posted: 24 Dec 2013 | Published: 31 Jul 2013

IBM

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

White paper: Big Data Integration and Governance Considerations for Financial Services
sponsored by IBM
WHITE PAPER: This white paper examines key big data integration and governance considerations for the financial services industry.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

IBM
151 - 175 of 1119 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement