IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
1 - 25 of 2367 Matches Previous Page  | Next Page
Mutual Fund Giant Securely Encrypts Multiple Customer Applications in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features a Boston-based investment services company, and reveals how they made the switch to cloud applications successfully.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

CipherCloud for Cloud Discovery
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

English and French Collaboration Opens Education Cloud Portal to Many Countries
sponsored by CipherCloud
WHITE PAPER: This case study focuses on a UK educational organization who strives to create a secure portal in the cloud, compatible with global partners in order to access educational tools.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

The 10-Minute Guide to Securing Email in the Cloud
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover a cloud encryption solution that caters to email security.
Posted: 23 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Best Practices for SIEM Advanced Attack Detection
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover the best practices for today's SIEM solutions and how you can maximize their performance and effectiveness in your organization's IT security.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

Leverage SIEM technology to Identify and Prevent Unauthorized Network Access
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover how you can leverage SIEM technology in order to detect unauthorized access to your networks and more effectively prevent malicious activities or content from infiltrating your security systems.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

Meet the N-able product family
sponsored by N-able Technologies
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

N-able Technologies

How to Keep Your Microsoft Lync Communications Secur
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Australian Insurance Provider Securely Launches Customer Web Services in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features Australia's largest provider of private health insurance, and describes their use of Salesforce as the cloud-based platform to house its phone and web-based healthcare services.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

CipherCloud

Staying Compliant and Secure in the Cloud Era
sponsored by CipherCloud
WEBCAST: This webcast reveals what it takes to stay compliant and protected in the age of the cloud.
Posted: 22 Sep 2014 | Premiered: Mar 10, 2014

CipherCloud

US Top 5 Bank Encrypts Protects Data in Over 50 Salesforce Orgs
sponsored by CipherCloud
CASE STUDY: This case study features a top 5 bank in the US that uses an encryption solution to protect customer cloud data.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

CipherCloud

Seven Steps to Protecting Your Cloud Information
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014

Rackspace

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a new threat-centric security strategy that can provide superior visibility, continuous control, and advanced threat protection during all part of an attack– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Email Archiving: What Drives It and How To Implement
sponsored by CommVault Systems, Inc.
VIDEO: This brief video examines how you can create and implement governance policies that will help to ensure that you're getting the most out of your content archiving strategy. Watch now to learn the five steps you can take to start with email archiving before determining if archiving additional content types is necessary.
Posted: 19 Sep 2014 | Premiered: 19 Sep 2014

CommVault Systems, Inc.

Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Rhode Island Blood Center Protects Donor Information and Locates Laptops using Absolute Computrace
sponsored by Absolute Software
CASE STUDY: In this case study, find out how the Rhode Island Blood Center used a simple, cost-effective solution to track hardware assets and ensure laptops remained protected.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Absolute Software

Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth white explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Streamline Operational Efficiency, Expand Service Offerings and Reach a New Customer Base
sponsored by Hitachi Data Systems
WHITE PAPER: This case study to examines how one organization was able to streamline operational efficiency, expand service offering and reach new customers with a new storage platform and unified, cloud computing.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Hitachi Data Systems

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Transforming Resiliency and TCO
sponsored by Riverbed Technology, Inc.
WHITE PAPER: The branch office has always been a dilemma for IT teams.  They're a critical point of productivity and revenue, but come with a tremendous amount of overhead and risk.
Posted: 18 Sep 2014 | Published: 30 Apr 2014

Riverbed Technology, Inc.
1 - 25 of 2367 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement