IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
51 - 75 of 1259 Matches Previous Page  | Next Page
Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 08 Jul 2014 | Published: 18 Apr 2014

Sophos, Inc.

Tablets in the Enterprise: A Checklist for Successful Deployment
sponsored by Code42
WHITE PAPER: This white paper provides the 7 steps organizations need to take in order to ensure that the data that is being stored on their tablets remains properly stored and protected.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Cloud Backup and Recovery: Small Businesses, Large Adopters
sponsored by Carbonite
WHITE PAPER: Check out these research results to learn who is adopting cloud-based backup and recovery solutions and how they balance the desire for business continuity, compliance, and data protection with concerns regarding budget, resources and expertise.
Posted: 07 Jul 2014 | Published: 31 Mar 2014

Carbonite

FTP VS MFT Why it’s time to make the change
sponsored by IBM
WHITE PAPER: Access this white paper to discover a managed file transfer (MFT) solution that has the power to upgrade, replace, consolidate or outsource your FTP processes.
Posted: 07 Jul 2014 | Published: 07 Jul 2012

IBM

Five Steps on Worry-Free Endpoint Backup and Data Migration
sponsored by Code42
WHITE PAPER: Access this brief white paper to learn the 5 steps you need to take in order to ensure worry-free endpoint backup and data migration. You'll get tips on how you can identify your backup endpoint backup needs, solve the pyramid problem with user self-restore, and more.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Hybrid Cloud Backup Delivers More for Less
sponsored by IBM
WHITE PAPER: In this technology brief, research firm Enterprise Strategy Group (ESG) shares their perspective on the increasing importance of a hybrid approach, which combines on-premise and cloud capabilities to meet today's data protection requirements.
Posted: 07 Jul 2014 | Published: 31 Jan 2014

IBM

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos, Inc.
WHITE PAPER: This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014

Sophos, Inc.

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Meeting Business Data Protection Needs
sponsored by CA ARCserve
WHITE PAPER: This white paper dives into the details about virtualization and unveils some hidden complexities when it comes to backup and recovery requirements.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

CA ARCserve

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Business Continuity with the Concerto™ 7000 All Flash Array
sponsored by Violin Memory
WHITE PAPER: Read this white paper and introduce yourself to a recovery and back-up solution that provides comprehensive data protection functions such as mirroring, snapshots, journaling, remote replication, and more.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Violin Memory

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

The New Mobile Security Agenda
sponsored by Accellion, Inc.
WHITE PAPER: This resource offers key recommendations for enhancing mobile security strategies to avoid business risk and disaster.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Business Continuity with Violin’s Concerto™ 7000 All Flash Array
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs.Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

How to Implement Next Generation Architecture
sponsored by CA ARCserve
WHITE PAPER: This white paper explains trends and challenges that customers may have when facing issues with data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

CA ARCserve
51 - 75 of 1259 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement