IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
76 - 100 of 1110 Matches Previous Page  | Next Page
Universities Have Much to Teach Cyber Thieves, Regrettably
sponsored by Peak 10
WHITE PAPER: Read this resource to gain insight on what steps institutions of higher education should take in leveraging IT tools to boost data protection strategies.
Posted: 21 Mar 2014 | Published: 04 Mar 2014

Peak 10

End Point Security in Medium and Large Organizations
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell, Inc.

Migrating Data to the Cloud? Have a Safe Trip.
sponsored by Peak 10
WHITE PAPER: This resource goes over some of the things to consider when moving data to the cloud. Choosing the right provider has a lot to do with the success of your storage in the cloud, and this resource provides the questions that need to be asked to make sure the right vendor is chosen.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Can the UK Find Security in US Cloud Services?
sponsored by Peak 10
WHITE PAPER: This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Cloud ROI: The Answer for Banking ROE?
sponsored by Peak 10
WHITE PAPER: Athough the banking industry has largely been slow to adopt the cloud in the past, this trend is not likely to continue much longer due to the advantages the cloud offers in terms of customer experience. It also recommends that banks focus more on the potential benefits and less on the back-end systems that process and store data.
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

Mobile, Secure AND Cost-Efficient Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Citrix

Tape Storage Meets Long Term Data Retention Challenges
sponsored by FujiFilm
WHITE PAPER: The Tape Storage Council issued this memo to highlight the current trends, usages and technology innovations occurring within the tape storage industry.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

FujiFilm

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores the role of recovery in data backup and security, and introduces a backup tool that delivers the key capabilities you need.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Barium Ferrite: The storage media of the future is here today
sponsored by FujiFilm
WHITE PAPER: This whitepaper examines BaFe technology and standard Metal Particle (MP) technology to provide comparisons between the two and explain the benefits of BaFe media. It will also explain the reasons for the stability and reliability of BaFe technology that serve as the basis for its use in solutions
Posted: 17 Mar 2014 | Published: 31 Dec 2013

FujiFilm

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 17 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

What is Data Governance?
sponsored by Rand Secure Data
WHITE PAPER: This resource takes an inside look at data governance and describes the role of archiving, backup, and eDiscovery in an effective data governance strategy.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Rand Secure Data

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

EMC Syncplicity With EMC Isilon
sponsored by EMC Corporation
WHITE PAPER: This resource gives insight into the new strategies for the always on business world and highlights the benefits of an enterprise-grade file sync and sharing solution.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

CIO Top Of Mind For 2013
sponsored by EMC Corporation
WHITE PAPER: This short resource gives survey results from over 600 CIOs and tells what they think about the biggest trends in storage today.
Posted: 11 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

CommVault Systems, Inc.

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash
sponsored by Dell, Inc.
WHITE PAPER: Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Dell, Inc.

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data

2014 HIMSS Analytics Report: Navigating the Health IT Archiving and Data Management Challenge
sponsored by Iron Mountain
WHITE PAPER: This report highlights survey results that indicate healthcare IT's need for a well-rounded data storage and archive strategy given the growth in information.
Posted: 07 Mar 2014 | Published: 28 Feb 2014

Iron Mountain

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CommVault Systems, Inc.

IBM Reputational Risk Index
sponsored by IBM
WHITE PAPER: Access this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM
76 - 100 of 1110 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement