IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1203 Matches Previous Page  |  Next Page
All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

There’s Never Been a Better Time to Virtualize
sponsored by VMware
WHITE PAPER: Access this white paper to learn more about the benefits of server virtualization. You'll learn about the benefits you can expect with virtualization, including, cost savings, streamlined manageability, maximized uptime, improved business continuity and security, and more.
Posted: 11 Nov 2014 | Published: 30 Jun 2014

VMware

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Safeguard Business-Critical Resources with a Comprehensive Imaging and Printing Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Strangers in Your Servers: Make Working with IT Contractors More Secure
sponsored by ObserveIT
WHITE PAPER: Access this white paper to learn about a solution that keeps an eye on users consistently.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

How to Make Virtual Hybrid Cloud Backup Easy
sponsored by Datto, Inc.
WHITE PAPER: This whitepaper examines an end-to-end backup solution that combines appliance hardware, lightweight backup agents and a remote, off-site cloud backup storage facility to provide businesses with full disaster recovery situations.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Datto, Inc.

Scale-out systems that put data to work
sponsored by IBM
WHITE PAPER: This resource highlights a solution that is the first generation of systems with processors designed for Big Data.
Posted: 31 Oct 2014 | Published: 17 Apr 2014

IBM

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Desktop as a Service is Gaining Ground
sponsored by NaviSite
WHITE PAPER: This white paper explores the top reasons to migrate to a DaaS or VDI environment center around data security and BYOD, and reveals the lasting impact on security.
Posted: 15 Oct 2014 | Published: 01 Jul 2014

NaviSite

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

What is the Dynamic Data Center?
sponsored by CA Technologies.
WHITE PAPER: Access this brief resource to learn how you can get on the path to a dynamic data center. You'll learn about System z, which provides central management of security, governance, cloud services, big data, and predictive analytics.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CA Technologies.

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Why Converged Infrastructure and Data Protection Should Be One Conversation
sponsored by Arrow & HDS
WHITE PAPER: Learn how you can ensure all of the benefits of virtualization by upgrading to a new data protection approach.
Posted: 24 Sep 2014 | Published: 30 May 2014

Arrow & HDS

Lower Risk and Cost with Proactive Information Governance
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how to ensure that your data assets are available, protected and managed through their entire lifecycle.
Posted: 20 Sep 2014 | Published: 12 Feb 2014

Hewlett-Packard Company

How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014

Rackspace

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a threat-centric security strategy that provides superior visibility, continuous control, and advanced threat protection– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
76 - 100 of 1203 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement