IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
1 - 25 of 2210 Matches Previous Page  | Next Page
A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Symantec Corporation

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by CA ARCserve
WHITE PAPER: This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

CA ARCserve

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BlackBerry

Critical Capabilities for Security Information and Event Management
sponsored by IBM
RESEARCH CONTENT: Uncover the key findings from Gartner's research on SIEM technologies.
Posted: 28 Jul 2014 | Published: 25 Jun 2014

IBM

Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Fortinet, Inc.

Discover the Danger Behind the Heartbleed Bug
sponsored by Symantec Corporation
WHITE PAPER: Discover the dangers lurking within the Heartbleed bug, and learn how your organization should respond to it.
Posted: 28 Jul 2014 | Published: 21 Jul 2014

Symantec Corporation

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Posted: 28 Jul 2014 | Published: 30 Apr 2014

Fortinet, Inc.

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

FortiOS® 5 Network Security Operating System
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover the key features of an industry-leading, next-gen firewall option.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fortinet, Inc.

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
WHITE PAPER: View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even with mobile devices. Read on to learn about the government's relationship with healthcare providers, as well as insight for securing devices to protect sensitive data.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

RailCom Meets Client Needs While Ensuring Corporate Data and Device Security
sponsored by IBM
CASE STUDY: Read this case study to find out how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based mobile solution.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

IBM

Getting Big Value out of Big Data: The Update
sponsored by IBM
WHITE PAPER: To serve your enterprise well, data must be scaled with fewer resources and managed with speed and continuity. Read this white paper to compare storage platforms and their benefits so you can find a solution that can expand cost-effectively, respond quickly, and doesn't require additional training.
Posted: 24 Jul 2014 | Published: 30 Apr 2014

IBM

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Securing Data at Rest with Encryption
sponsored by Amazon Web Services
WHITE PAPER: This informative guide offers 3 different models for how encryption keys are managed and where they are used. Read on to learn about the different methods for encrypting your data at rest in AWS today.
Posted: 23 Jul 2014 | Published: 30 Nov 2013


Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
WHITE PAPER: This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: 23 Jul 2014 | Published: 30 Jun 2014

AlienVault

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This solution brief highlights the challenges organizations feel in the face of IT consumerization and BYOD trends. It also mentions one solution that improves the productivity of mobile file sharing without sacrificing security or compliance.
Posted: 21 Jul 2014 | Published: 31 Mar 2014

Acronis

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation
1 - 25 of 2210 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement