IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
26 - 50 of 1332 Matches Previous Page  | Next Page
Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data
sponsored by BitGlass
WHITE PAPER: This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box with the security and compliance of a private cloud.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper describes how BitGlass partnered with AMAG Pharmaceuticals to resolve critical security and privacy issues following the company's adoption of Google Apps' cloud and BYOD tools.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Cisco UCS Mini: A Technical Overview
sponsored by Zones, Inc.
WHITE PAPER: This white paper describes how the Cisco UCS, renowned for its ability to unite computing, networking, storage access, and management resources in a single platform, is now optimized for branch and remote offices, point-of-sale, and smaller IT environments with Cisco UCS Mini.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

Zones, Inc.

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

What is the Dynamic Data Center?
sponsored by CA Technologies.
WHITE PAPER: Access this brief resource to learn how you can get on the path to a dynamic data center. You'll learn about System z, which provides central management of security, governance, cloud services, big data, and predictive analytics.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CA Technologies.

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

Overview of Data Loss Prevention
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover the challenges of securing data and monitoring it closely.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

CDW Corporation

Solution Spotlight DLP PDF
sponsored by CDW Corporation
WHITE PAPER: This white paper explains the importance of monitoring your data, even when it's out of sight.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

CDW Corporation

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Proactively Address Regulatory Compliance Requirements and Protect Sensitive Data in Real Time
sponsored by IBM
WHITE PAPER: Learn how Hadoop is helping companies like yours tame big data, and uncover the data security and compliance concerns that accompany it.
Posted: 02 Oct 2014 | Published: 30 Apr 2013

IBM

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian

Six Reasons VDI + Data Protection Can Strengthen Your Security Posture
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover six reasons VDI and data protection can strengthen your security posture as a whole.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

IBM Infosphere Data Privacy for Hadoop
sponsored by IBM
WHITE PAPER: Find out about the IBM InfoSphere Data Privacy for Hadoop which can help businesses like you build confidence in big data.
Posted: 29 Sep 2014 | Published: 31 Jan 2014

IBM

Electronics Retailer Reduces Order Fraud by 25% with iovation
sponsored by iovation, Inc.
WHITE PAPER: A major computer and electronics retailer fights back against identity theft and credit card fraud, by adding device intelligence into their fraud prevention strategy. Find out how it works behind the scenes.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

How to Protect Unstructured Data
sponsored by Digital Guardian
WHITE PAPER: This white paper outlines a data protection model that is used to control unstructured data by identifying and applying policy-based controls over the data's lifecycle.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian
26 - 50 of 1332 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement