IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
1 - 25 of 2203 Matches Previous Page  |  Next Page
Enhancing Microsoft BitLocker for Your Enterprise
sponsored by WinMagic
WEBCAST: While BitLocker is a popular data encryption option, there are some gaps in the technology that need filling. This webcast explores how to enhance BitLocker to protect data at rest on any endpoint.
Posted: 30 Jun 2015 | Premiered: Dec 17, 2014

WinMagic

Presentation Transcript: Modern Cloud Storage Solutions
sponsored by NetApp
TRANSCRIPT: In this resource, four storage experts discuss how to maintain data retention and rapid recover time in the modern, hybrid IT environment.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

NetApp

Data Encryption Demystified: Seven Common Misconceptions and the Solutions that Dispel Them
sponsored by WinMagic
WHITE PAPER: This white paper presents the top 7 myths and misconceptions about encryption and how new approaches dispel them. Access this helpful resource now to get caught up on encryption technology today and learn why you need it in your modern cybersecurity strategy.
Posted: 29 Jun 2015 | Published: 27 May 2015

WinMagic

Simplifying Data at Rest Encryption and Security
sponsored by WinMagic
WEBCAST: This webcast explores full-disk encryption and how it can simplify securing data at rest as well as access management and network security.
Posted: 29 Jun 2015 | Premiered: Jun 10, 2015

WinMagic

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: This white paper explores how to ensure comprehensive FDE on all platforms and devices.
Posted: 29 Jun 2015 | Published: 10 Apr 2014

WinMagic

Data Protection in the Cloud: Are you Protecting Customers and Employees
sponsored by SilverSky
WEBCAST: In this webcast, you will learn the 7 questions to ask vendors to know the level of data protection to expect before migrating to the cloud.
Posted: 29 Jun 2015 | Premiered: Nov 20, 2014

SilverSky

What We Can Learn from Recent Data Breaches
sponsored by SilverSky
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

SilverSky

Keep Corporate Data Secure in a BYOD World
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this expert eGuide to learn the secrets of securing your data from the three common threat vectors by ensuring you have the right VPN features.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and Intel®

Five Pillars of Transparent Data Security
sponsored by WinMagic
WHITE PAPER: This white paper outlines the 5 essential pillars of transparent data security to remove workflow and performance burdens.
Posted: 26 Jun 2015 | Published: 19 Dec 2012

WinMagic

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of each of these three strategies from an IT security perspective. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Case Study: Enhancing a Leading Bank's File Monitoring
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank is able to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Inside Big Data for Finance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper outlines the best strategies for utilizing big data in the financial sector.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Dell, Inc. and Intel®

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 25 Jun 2015 | Published: 18 Jun 2015

NetApp

Medical Record Privacy: Why Patients are Losing Trust
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores the guidelines healthcare IT organizations must follow to let patients know their privacy is valued as highly as their health.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis
1 - 25 of 2203 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement