IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
51 - 75 of 1140 Matches Previous Page  | Next Page
Get With The Times: Hospitals Need to Update Data Storage Practices
sponsored by Iron Mountain
WHITE PAPER: This brief resource offers 3 healthcare data storage best practices to best manage and secure growing and changing records.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Iron Mountain

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

Confidence, ownership and visibility: Mapping the road ahead for data governance
sponsored by IBM
WHITE PAPER: In this report from the 2013 first annual summit of the Data Governance Forum, take a look at the highlights of the event and get key summaries from presentations given by data governance experts in both public- and private-sector organizations.
Posted: 08 Apr 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM

Top Reasons to Choose EMC Isilon for Business Analytics
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 30 Mar 2012

EMC & Arrow

EMC Isilon Scale-Out NAS for In-Place Hadoop Data Analytics
sponsored by EMC & Arrow
WHITE PAPER: This is a thorough guide to the benefits of Isilon from EMC. It gives the benefits that this scale-out NAS solution can have in terms of analytics as well as efficiency and reliability.
Posted: 04 Apr 2014 | Published: 29 Nov 2013

EMC & Arrow

Mobile Application Security Study
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

Top 10 Reasons to Choose EMC Isilon for Hadoop Analytics
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC & Arrow

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Application Performance for Oil and Gas Seismic Analysis
sponsored by Dot Hill Systems Corp.
WHITE PAPER: The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.
Posted: 04 Apr 2014 | Published: 14 Mar 2014

Dot Hill Systems Corp.

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Windows To Go: Empower And Secure The Mobile Workforce
sponsored by Imation Corp.
WHITE PAPER: Check out this exclusive white paper to discover how two industry-leading vendors' products are working together to provide easier mobile computing, data protection and security that you need – at an affordable price.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Imation Corp.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

Marienhospital Medical Professionals Improve Care With Mobile Clinical Computing
sponsored by Dell, Inc.
WHITE PAPER: This case study highlights a leading German hospital's success with mobile clinical computing that improved data availability across the facility.
Posted: 02 Apr 2014 | Published: 30 Nov 2012

Dell, Inc.

Quantum Corporation Solution Guide: The Changing Role of Tape
sponsored by Quantum Corporation
WHITE PAPER: This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data.
Posted: 02 Apr 2014 | Published: 31 Oct 2009

Quantum Corporation

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Top 7 Use Cases for Business-Class Cloud File Sync
sponsored by eFolder
WHITE PAPER: This white paper describes the seven key areas where business-class cloud file sync can deliver value for virtually any organization, no matter size or industry. In an increasingly mobile world, providing documents that are in sync at all time is vital, and cloud file sync can deliver that.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

eFolder

EMC’s Flash Strategy
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores why one industry leader is doubling down on its investment in flash in order to drive dramatic and necessary change by developing a comprehensive flash portfolio built to fit a wide array of situations.
Posted: 01 Apr 2014 | Published: 29 Mar 2013

EMC & Arrow

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems
51 - 75 of 1140 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement