IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1240 Matches Previous Page  |  Next Page
Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

Cloud Deployment with Enterprise Endpoint Backup and File Sync/Share
sponsored by Code42
WHITE PAPER: Read this white paper to find out about a solution that allows organizations to select their preferred cloud deployment strategy while providing enterprise endpoint backup and file sync and share to meet industry standards for data security.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

BitGlass

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

The Future of Data Security: A Zero Trust Approach
sponsored by IBM
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

IBM

Lower Risk and Cost with Proactive Information Governance
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how to ensure that your data assets are available, protected and managed through their entire lifecycle.
Posted: 20 Sep 2014 | Published: 12 Feb 2014

Hewlett-Packard Company

BYOD or Bust: Are Your Mobile Policies Keeping Up with Your Employees?
sponsored by Symantec Corporation
WHITE PAPER: What is BYOD? Why should business people pay attention to it? Get the background on the bring-your-own-device trend, and learn how your organization should meet emerging opportunities and threats, in this report.
Posted: 16 Sep 2014 | Published: 30 Apr 2013

Symantec Corporation

Symantec 2014 Internet Threat Report
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth analysis, discover the biggest security trends and developments that organizations need to be aware of to stay protected.
Posted: 15 Sep 2014 | Published: 30 Apr 2014

Symantec Corporation

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Six Ways You May Be Losing Mobile Data and Not Even Know It
sponsored by Symantec Corporation
WHITE PAPER: This crucial white paper outlines the 6 ways that your mobile data could be compromised, and why you might not even realize that it's happening until it's too late.
Posted: 29 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Top Ten Tips for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: Learn the top 10 ways to secure your business against cyber risk and threats in this informative infographic.
Posted: 27 Aug 2014 | Published: 30 Jun 2014

Symantec Corporation

A Roadmap to Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: Discover what it takes to become cyber resilient in this informative white paper.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Symantec Corporation

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Managing the Healthcare Information Stream Effectively
sponsored by CommVault
WHITE PAPER: Check out this white paper to discover the looming challenge of managing the healthcare information stream.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

CommVault
151 - 175 of 1240 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement