IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityWhite Papers (View All Report Types)
76 - 100 of 1309 Matches Previous Page  | Next Page
The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Desktop as a Service is Gaining Ground
sponsored by NaviSite
WHITE PAPER: This white paper explores the top reasons to migrate to a DaaS or VDI environment center around data security and BYOD, and reveals the lasting impact on security.
Posted: 15 Oct 2014 | Published: 01 Jul 2014

NaviSite

Bringing DLP Inside the Organization
sponsored by Clearswift
WHITE PAPER: This white paper delves into the subject of data loss prevention (DLP) inside the organization, examining the way that critical information is shared within a business and discussing the pros and cons of implementing DLP solutions at different points.
Posted: 15 Oct 2014 | Published: 31 Dec 2013

Clearswift

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

Cloud Deployment with Enterprise Endpoint Backup and File Sync/Share
sponsored by Code42
WHITE PAPER: Read this white paper to find out about a solution that allows organizations to select their preferred cloud deployment strategy while providing enterprise endpoint backup and file sync and share to meet industry standards for data security.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

How to Manage Data Security and Compliance Within an Enterprise
sponsored by IBM
WHITE PAPER: This white paper introduces a data security solution that puts an end to potential hackers and privileged insiders by eliminating unauthorized activity.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Continuous Monitoring for Data Access and Sensitive Information
sponsored by IBM
WHITE PAPER: This white paper highlights a simple, robust solution that assures the security and integrity of data in several environments, such as big data platforms.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

What is the Dynamic Data Center?
sponsored by CA Technologies.
WHITE PAPER: Access this brief resource to learn how you can get on the path to a dynamic data center. You'll learn about System z, which provides central management of security, governance, cloud services, big data, and predictive analytics.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CA Technologies.

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

Overview of Data Loss Prevention
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover the challenges of securing data and monitoring it closely.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

CDW Corporation

Solution Spotlight DLP PDF
sponsored by CDW Corporation
WHITE PAPER: This white paper explains the importance of monitoring your data, even when it's out of sight.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

CDW Corporation

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Proactively Address Regulatory Compliance Requirements and Protect Sensitive Data in Real Time
sponsored by IBM
WHITE PAPER: Learn how Hadoop is helping companies like yours tame big data, and uncover the data security and compliance concerns that accompany it.
Posted: 02 Oct 2014 | Published: 30 Apr 2013

IBM
76 - 100 of 1309 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement