IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
1 - 25 of 2251 Matches Previous Page  |  Next Page
The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.
Posted: 22 May 2015 | Published: 31 May 2014

IBM

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Replacing Legacy Enterprise Backup In the Mobile World
sponsored by Druva Software
WHITE PAPER: Follow four companies through the vendor selection process of modern endpoint backup solutions. You'll see how different providers compare on factors like performance, ease of management, scalability, and usability.
Posted: 22 May 2015 | Published: 30 Apr 2015

Druva Software

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

SVC and Red Hat Secure Austrian Healthcare E-card System
sponsored by Red Hat
CASE STUDY: Access this case study to learn how one organization implemented an enterprise application platform to construct a sustainable architecture for the operation of an electronic health card. Explore the key elements of the e-card infrastructure and how it enables secure, efficient communication between patients and providers.
Posted: 21 May 2015 | Published: 30 Apr 2015

Red Hat

Preparing for The New World of Data Privacy: What Global Enterprises Need to Know
sponsored by Druva Software
WHITE PAPER: For senior IT leaders who are addressing data privacy concerns in their organizations, this paper covers the key issues to consider and gives recommendations for complying with data residency laws and protecting corporate and employee data privacy.
Posted: 21 May 2015 | Published: 21 May 2015

Druva Software

Best Practices for FTP in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, you'll find the information you need to decide whether or not it's time to move on from FTP. Additionally, this guide offers tips for achieving best practice if you do stick with FTP.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

Avoid Risks by Keeping Secure FTP Policies Straightforward
sponsored by IBM
EGUIDE: In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

Content Collaboration: 5 Things to Look for in a Vendor
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper presents the 5 key features of a successful content collaboration software service that can help you improve your collaboration security without breaking the bank or complicating business processes.
Posted: 20 May 2015 | Published: 20 May 2015

IntraLinks, Inc

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Case Study: Cloud Content Management Investments
sponsored by Box
WHITE PAPER: This infographic depicts the anatomy of a decision for cloud content management investments. Learn about how one law firm successfully leveraged online connectivity to bring together a distributed team of attorneys occupying home and regional offices.
Posted: 20 May 2015 | Published: 20 May 2015

Box

File Sync and Sharing: When Collaboration Gets Complex
sponsored by Box
WHITE PAPER: Today's differing file sync and sharing (FSS) strategies cause decision-makers to scratch their heads. The following white paper explores the growing complexities of the FSS market. Discover key functionalities as you weigh various available offerings.
Posted: 20 May 2015 | Published: 31 Dec 2014

Box

Expert Analysis: Enterprise File Synchronization and Sharing
sponsored by Box
WHITE PAPER: This study, conducted by Gartner research analysts, highlights significant changes that will impact users and providers in the EFSS sector. Less than 10% of today's EFSS vendors will offer standalone products by 2017, so get a headstart on your strategy and investigate up-and-coming capabilities.
Posted: 20 May 2015 | Published: 02 Jul 2014

Box

The State of Data Privacy in 2015: A Survey of IT Professionals
sponsored by Druva Software
WHITE PAPER: This Druva-sponsored study by Dimensional Research examines the importance of data privacy, challenges for IT in managing the privacy of sensitive business and customer data, and the impact of cloud technologies.
Posted: 20 May 2015 | Published: 30 Apr 2015

Druva Software

Simplifying Protection of Critical Assets
sponsored by AVG Technologies
EGUIDE: This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.
Posted: 20 May 2015 | Published: 20 May 2015

AVG Technologies

How to Streamline the Regulatory Filings Process
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores one approach to streamline the regulatory filing process, ensure granular control, and avoid penalties.
Posted: 19 May 2015 | Published: 29 Apr 2015

IntraLinks, Inc

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift
1 - 25 of 2251 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement