IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1244 Matches Previous Page  |  Next Page
Time for Legal and Compliance Staff to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks

The Liaison Alloy Platform
sponsored by Liaison Technology
WHITE PAPER: The world's first dPaaS (data Platform as a Service) solution available addresses the needs of a growing enterprise through a data-centric approach and provides infinite scale, resiliency, and robust security. Read this white paper to learn more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Liaison Technology

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

An IT Auditor's Guide to Security Controls & Risk Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper provides a framework for simplifying compliance enforcement and audits through six key policy controls.  Access now to learn how to achieve compliance harmony.
Posted: 09 Apr 2015 | Published: 05 Nov 2014

Bit9 + Carbon Black

Recovery Performance-based Pricing: An innovation to drive business growth
sponsored by Asigra
WHITE PAPER: This white paper examines a backup and recovery service model that focuses pricing on the amount of data recovered, not the amount of data that is backed up.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Asigra

Case Study: Pernod Ricard Streamlines Approach to Cloud Backup & Disaster Recovery in EMEA
sponsored by Asigra
WHITE PAPER: This white paper examines how this organization was able to leverage cloud-based technologies to transform what had been an ad hoc approach into a single highly-effective backup solution with well-established recovery objectives.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Asigra

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

On the Front Lines: How IT Can Manage Real-Time Risks
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn the basics of managing risk in your enterprise. While a challenge, this resource explains why analytics and data management consultants are your main line of defense that allow you to detect threats.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Data Analytics Security Platform Buyer's Guide
sponsored by HP Security Voltage
WHITE PAPER: This white paper explores how to protect your data to stay compliant with today's stringent healthcare regulations. Read on to learn more
Posted: 03 Apr 2015 | Published: 19 Nov 2014

HP Security Voltage

BYOD and Mobile Computing: Keep Data Secure and IT Sane
sponsored by Veracode, Inc.
WHITE PAPER: Access this informative fact sheet to learn about cloud-based solutions that evaluate all mobile applications on enterprise-managed devices. Discover how the service taps information about hundreds of thousands of mobile applications, using behavioral analysis technology.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Licensing: The Next Great Disruptor to the Data Protection Status Quo
sponsored by Asigra
WHITE PAPER: This white paper takes you through the history of licensing and how current trends are shaping the future model on the horizon. View now to learn what's in store for licensing costs.
Posted: 03 Apr 2015 | Published: 04 Dec 2013

Asigra

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage
26 - 50 of 1244 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement