IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1284 Matches Previous Page  |  Next Page
Controlling and Auditing thin clients
sponsored by BalaBit
WHITE PAPER: This white paper explores a user activity monitoring solution to audit protocols used in popular thin-client applications, allowing monitoring and recording of all user activities independent of the application being used. Learn how organizations can record user activity in virtual applications that store sensitive information.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BalaBit

The Digital Guardian Managed Security Program (MSP) Technical Overview
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to simplify managing sensitive data and intellectual property protection.  Access now to learn more.
Posted: 20 Apr 2015 | Published: 18 Feb 2015

Digital Guardian

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Monitoring the Hybrid Cloud: Evolving to the CloudSOC
sponsored by IBM
WHITE PAPER: In this in-depth white paper, find tips for managing all aspects of cloud computing without sacrificing security monitoring.
Posted: 17 Apr 2015 | Published: 07 Jan 2015

IBM

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by White Hat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 16 Apr 2015 | Published: 18 Dec 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn how to get the most out of your EMM compliance strategy. View now to explore a helpful checklist.
Posted: 15 Apr 2015 | Published: 17 Dec 2014

BlackBerry

Time for Legal and Compliance Staff to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks

The Liaison Alloy Platform
sponsored by Liaison Technology
WHITE PAPER: The world's first dPaaS (data Platform as a Service) solution available addresses the needs of a growing enterprise through a data-centric approach and provides infinite scale, resiliency, and robust security. Read this white paper to learn more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Liaison Technology

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

An IT Auditor's Guide to Security Controls & Risk Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper provides a framework for simplifying compliance enforcement and audits through six key policy controls.  Access now to learn how to achieve compliance harmony.
Posted: 09 Apr 2015 | Published: 05 Nov 2014

Bit9 + Carbon Black

Recovery Performance-based Pricing: An innovation to drive business growth
sponsored by Asigra
WHITE PAPER: This white paper examines a backup and recovery service model that focuses pricing on the amount of data recovered, not the amount of data that is backed up.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Asigra

Case Study: Pernod Ricard Streamlines Approach to Cloud Backup & Disaster Recovery in EMEA
sponsored by Asigra
WHITE PAPER: This white paper examines how this organization was able to leverage cloud-based technologies to transform what had been an ad hoc approach into a single highly-effective backup solution with well-established recovery objectives.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Asigra

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

On the Front Lines: How IT Can Manage Real-Time Risks
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn the basics of managing risk in your enterprise. While a challenge, this resource explains why analytics and data management consultants are your main line of defense that allow you to detect threats.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited
76 - 100 of 1284 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement