IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
51 - 75 of 1125 Matches Previous Page  | Next Page
How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Application Performance for Oil and Gas Seismic Analysis
sponsored by Dot Hill Systems Corp.
WHITE PAPER: The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.
Posted: 04 Apr 2014 | Published: 14 Mar 2014

Dot Hill Systems Corp.

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

Marienhospital Medical Professionals Improve Care With Mobile Clinical Computing
sponsored by Dell, Inc.
WHITE PAPER: This case study highlights a leading German hospital's success with mobile clinical computing that improved data availability across the facility.
Posted: 02 Apr 2014 | Published: 30 Nov 2012

Dell, Inc.

Quantum Corporation Solution Guide: The Changing Role of Tape
sponsored by Quantum Corporation
WHITE PAPER: This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data.
Posted: 02 Apr 2014 | Published: 31 Oct 2009

Quantum Corporation

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Top 7 Use Cases for Business-Class Cloud File Sync
sponsored by eFolder
WHITE PAPER: This white paper describes the seven key areas where business-class cloud file sync can deliver value for virtually any organization, no matter size or industry. In an increasingly mobile world, providing documents that are in sync at all time is vital, and cloud file sync can deliver that.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

eFolder

EMC’s Flash Strategy
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores why one industry leader is doubling down on its investment in flash in order to drive dramatic and necessary change by developing a comprehensive flash portfolio built to fit a wide array of situations.
Posted: 01 Apr 2014 | Published: 29 Mar 2013

EMC & Arrow

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

6 Steps to Protect Your Intellectual Property
sponsored by Websense
WHITE PAPER: In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense

Backup Basics: Choosing the Right Data Protection System
sponsored by Quantum Corporation
WHITE PAPER: This informative guide will assist you in selecting data protection solutions best fit for your organization's needs, and explains the tools that you need to automatically and reliably make sure your data is safe.
Posted: 31 Mar 2014 | Published: 31 Jan 2014

Quantum Corporation

Cloud Backup and SMB Channel Opportunities
sponsored by Carbonite
WHITE PAPER: This guide talks about the state of cloud backup and storage and it's growing role in the SMB market. Different factors are considered in relation to the needs and resources of SMBs looking into cloud storage and backup.
Posted: 28 Mar 2014 | Published: 30 Apr 2013

Carbonite

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 27 Mar 2014 | Published: 31 Oct 2013

IBM

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Test Data Management for Security and Compliance
sponsored by Informatica
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

Informatica

The Essentials of Modern Enterprise Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper talks about the benefits of a modern data protection solution. This solution provides a single, modern platform that can efficiently capture, move, retain, fund and recover data from any storage tier. This solution also delivers improved recovery times, reduced costs, improved operations and consolidated budget line items.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

CommVault Systems, Inc.

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

Driving Smart Data Management in the 3rd Platform Era
sponsored by CommVault Systems, Inc.
WHITE PAPER: This White Paper explores the challenges associated with data management in the context of the 3rd Platform, particularly around Big Data and cloud. In addition, the paper takes a look at how the adoption of CommVault Simpana can help organizations address these data management challenges.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

CommVault Systems, Inc.

Cisco Connected World: International Mobile Security Study
sponsored by Cisco
WHITE PAPER: This brief resource highlights the top 3 mobile user expectations of network connectivity.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

Cisco

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 26 Mar 2014 | Published: 31 Oct 2013

IBM

Thriving in a BYOD World: 3 steps to Enterprise Mobility
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this resource to reveal 3 critical steps to take when building a complete and secure mobile strategy.
Posted: 25 Mar 2014 | Published: 13 Mar 2014

Hewlett-Packard Company
51 - 75 of 1125 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement