IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
76 - 100 of 1252 Matches Previous Page  | Next Page
Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Top 10 Review: Voltage SecureMail Cloud Standard
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper highlights a secure email platform that scored 10/10 in reviews on recipient experience and administration tools
Posted: 17 Jun 2014 | Published: 31 Dec 2013

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


HP StoreOnce Backup
sponsored by HP and Intel
WHITE PAPER: In this white paper, learn about the only federated deduplication solution that provides disk-based backup for all types of IT environments. Read on to discover how you can reduce the risk of data loss as well as the cost of data protection, and find key features and benefits.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

HP and Intel

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
WHITE PAPER: This white paper highlights the benefits of centralizing data on a single cloud platform to better protect today's decentralized IT infrastructure.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Box

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Security and Controlling Data in the Cloud
sponsored by Vormetric
WHITE PAPER: This white paper reveals the ability to extend existing security systems to cloud environments to provide consistent and all-around protection.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

Vormetric

Simplifying IT Operations and Improving Data Access Security
sponsored by Vormetric
WHITE PAPER: This resource explores the challenges in key management encryption and explains why current solutions fall short.
Posted: 12 Jun 2014 | Published: 31 Jul 2012

Vormetric

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

Taking control of file sharing services
sponsored by Mimecast
WHITE PAPER: This white paper offers key recommendations on choosing an enterprise-grade file sharing service for optimum collaboration security.
Posted: 10 Jun 2014 | Published: 30 Apr 2014

Mimecast

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Vormetric Encryption Architecture Overview
sponsored by Vormetric
WHITE PAPER: This white paper explains why an encryption strategy is a must in order to better protect data from security breaches.
Posted: 10 Jun 2014 | Published: 31 Dec 2012

Vormetric

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

How Can Server Virtualization Improve Data Protection?
sponsored by VMware, Inc.
WHITE PAPER: In this expert e-guide, learn what virtualizing servers in your storage environment can do for your data and the level of protection, as well as ease that virtualization provides.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

VMware, Inc.

EMC vs. Oracle: Examining Storage Systems for Your Backup Environment
sponsored by Oracle Corporation
WHITE PAPER: This resource explores a backup and restore system that will offer your organization layers of data protection and integrity while providing you the peace of mind to focus on your business and not your data security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Oracle Corporation

Solving for "Total Cost" in The Cloud
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This white paper shares tips on how to keep the total cost of ownership low for your business with the addition of cloud applications.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

CenturyLink Technology Solutions

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource highlights the benefits of a federated identity service for organizations with scalable user environments.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Radiant Logic, Inc.

Balancing HADOOP Data Security with Performance
sponsored by Vormetric
WHITE PAPER: This white paper features a Hadoop data security system that offers encryption to boost protection without weighing down performance.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Vormetric

5 Pillars of API Management
sponsored by CA Technologies.
WHITE PAPER: Learn about API management solutions that can help your business tackle the security challenges of APIs, and uncover the 5 pillars of API management.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

CA Technologies.

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper offers 5 valuable steps to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Evaluating File Sync and Share Solutions
sponsored by Dropbox for Business
WHITE PAPER: This resource offers a 12-question checklist to go through when evaluating file sync and share vendors.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

Uncovering Bust-Out Fraud with FICO Identity Resolution Engine
sponsored by FICO
WHITE PAPER: Discover how a powerful new social link analysis technology can help banks improve detection of bust-out fraud perpetrators, and better protect their funds.
Posted: 11 Jun 2014 | Published: 31 Dec 2013

FICO
76 - 100 of 1252 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement