IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
1 - 25 of 1958 Matches Previous Page  | Next Page
10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

SIOS Technology Corp

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool
sponsored by EMC Corporation
PRODUCT OVERVIEW: Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Signature-less Malware Detection: Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats.
Posted: 15 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Stalking the Kill Chain
sponsored by EMC Corporation
WHITE PAPER: Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.
Posted: 15 Apr 2014 | Published: 31 Oct 2012

EMC Corporation

Refreshing, Resetting, and Restoring: A Guide to Recovery Options in Windows
sponsored by CommVault Systems, Inc.
WHITE PAPER: Explore this informative white paper to uncover all the ins-and-outs of each Windows troubleshooting option, and in which situations each should be used.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

CommVault Systems, Inc.

Sharepoint, SQL, and Exchange Backup in Virtual and Physical Environments
sponsored by PHD Virtual
WHITE PAPER: This white paper explores backup, archiving, replication, and more with respect to data protection of Windows Server, Microsoft SharePoint, Microsoft SQL, and Microsoft Exchange environments.
Posted: 14 Apr 2014 | Published: 06 Feb 2014

PHD Virtual

Losing My Religion: Virtualization Backup Dogma, Faith, and Fact
sponsored by PHD Virtual
WHITE PAPER: This technology brief cuts through the self-serving and competing claims and examines each of the arguments in favor and against the various techniques used for virtual data protection
Posted: 14 Apr 2014 | Published: 31 Dec 2012

PHD Virtual

Records Management Solutions That Keep You HIPAA-Compliant
sponsored by Iron Mountain
WHITE PAPER: This white paper features a HIPAA-compliant healthcare partner that offers you the benefits of outsourcing while ensuring data protection across your organization.
Posted: 14 Apr 2014 | Published: 22 Oct 2013

Iron Mountain

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

10 Network Security Tools and Tests Everyone Should Use
sponsored by CommVault Systems, Inc.
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

CommVault Systems, Inc.

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
WHITE PAPER: This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

BlackBerry

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration.
Posted: 10 Apr 2014 | Published: 30 Jun 2013

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled them to achieve increased productivity, maintain compliance, and boost security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by CDW and IBM
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

CDW and IBM

Enabling the Business with Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: Social media is quickly becoming a key part of enterprise business strategy. According to an IDG Research survey, 73% of respondents expect it to be critical or very important in the coming years. So how can CIOs prepare for and encourage the adoption of social media in the enterprise in a secure, compliant way?
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Hootsuite

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
sponsored by Gartner
BROCHURE: Access the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Gartner

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Expert Advice – 20 Practical Tips on Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource reveals 20 single sign-on (SSO) and strong authentication implementation tips from your successful peers.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

IDC Report: Simplifying Data Protection for Virtual Environments
sponsored by PHD Virtual
WHITE PAPER: This IDC Vendor Profile discusses the firm PHD Virtual Technologies and its virtualized data protection solutions. In addition, this document examines PHD's supplier profile and strategy as well as some of the challenges PHD could encounter as it tries to differentiate itself in a market that is getting increasingly competitive.
Posted: 10 Apr 2014 | Published: 31 Dec 2012

PHD Virtual

Healthcare Disaster Recovery
sponsored by CDW and IBM
WHITE PAPER: This white paper guides you through healthcare data basics to help you better understand what exactly you need to protect. Click now to discover backup and disaster recovery best practices to ensure always-on data availability and minimal downtime.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

CDW and IBM

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Confidential Collaboration: How to manage regulatory compliance & data privacy while keep your data safe
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers 4 key recommendations on how to maintain regulatory compliance while using collaborative processes.
Posted: 09 Apr 2014 | Published: 31 Oct 2013

IntraLinks, Inc
1 - 25 of 1958 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement