IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
101 - 125 of 1972 Matches Previous Page  | Next Page
Cloud ROI: The Answer for Banking ROE?
sponsored by Peak 10
WHITE PAPER: Athough the banking industry has largely been slow to adopt the cloud in the past, this trend is not likely to continue much longer due to the advantages the cloud offers in terms of customer experience. It also recommends that banks focus more on the potential benefits and less on the back-end systems that process and store data.
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Mobile, Secure AND Cost-Efficient Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Citrix

Tape Storage Meets Long Term Data Retention Challenges
sponsored by FujiFilm
WHITE PAPER: The Tape Storage Council issued this memo to highlight the current trends, usages and technology innovations occurring within the tape storage industry.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

FujiFilm

Data Protection: From many angles and places
sponsored by TechTarget
RESOURCE: Data protection is not a one-size-fits-all mechanism; it comes in many forms and from many places. Understanding these different facets of data protection is crucial when choosing one that's right for your organization. Take this brief survey and access this expert e-guide to learn about the angles and places of data protection.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

SaaS Core Financial Systems Deliver Results
sponsored by Workday
EGUIDE: This expert e-guide from SearchFinancialApplications.com explores why cloud fears are vanishing and investigates the value that you can achieve with a SaaS core financial system. Also inside, find a real-world financial management success story.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Workday

Putting Data Governance and Stewardship Into Play
sponsored by TechTarget
RESOURCE: With technology continuing to evolve, data governance and data stewardship needs to evolve with it in order for it to stick long-term. Take this survey to gain access to an exclusive guide that provides a fresh approach to data governance and data stewardship.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Restore Balance With Authentication Technologies
sponsored by TechTarget
RESOURCE: When it comes to identity management you can never be too careful, and with the addition of cloud identity on the market there's more uncertainty than ever as to whether it's ready for the spot light. Take this survey to access this informative e-guide providing you with a comprehensive introduction and best practices for two-factor authentication.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

IBM Security Services Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world.
Posted: 18 Mar 2014 | Published: 31 Jul 2013

IBM

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores the role of recovery in data backup and security, and introduces a backup tool that delivers the key capabilities you need.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Barium Ferrite: The storage media of the future is here today
sponsored by FujiFilm
WHITE PAPER: This whitepaper examines BaFe technology and standard Metal Particle (MP) technology to provide comparisons between the two and explain the benefits of BaFe media. It will also explain the reasons for the stability and reliability of BaFe technology that serve as the basis for its use in solutions
Posted: 17 Mar 2014 | Published: 31 Dec 2013

FujiFilm

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 17 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

What is Data Governance?
sponsored by Rand Secure Data
WHITE PAPER: This resource takes an inside look at data governance and describes the role of archiving, backup, and eDiscovery in an effective data governance strategy.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Rand Secure Data

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer’s Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 14 Mar 2014 | Published: 19 Mar 2014


Identify and Conquer Today's Backup Challenges
sponsored by SearchDataBackup.com
EBOOK: This white paper explains some of the toughest backup challenges facing IT professionals today including data growth and virtual servers. It goes over the ins and outs of backing up large volumes of data and talks about the importance backing up data for mobile devices due to the rise of popularity in BYOD.
Posted: 14 Mar 2014 | Published: 19 Mar 2014

SearchDataBackup.com

EMC Syncplicity With EMC Isilon
sponsored by EMC Corporation
WHITE PAPER: This resource gives insight into the new strategies for the always on business world and highlights the benefits of an enterprise-grade file sync and sharing solution.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

CIO Top Of Mind For 2013
sponsored by EMC Corporation
WHITE PAPER: This short resource gives survey results from over 600 CIOs and tells what they think about the biggest trends in storage today.
Posted: 11 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

CommVault Systems, Inc.

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash
sponsored by Dell, Inc.
WHITE PAPER: Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Dell, Inc.

LogicMonitor Free Trial Request
sponsored by LogicMonitor
TRIAL SOFTWARE: Download this 2-week free trial of a hosted monitoring architecture to solve your monitoring problems with a single Collector.
Posted: 10 Mar 2014 | Premiered: 10 Mar 2014

LogicMonitor

IBM Reputational Risk Index
sponsored by IBM
WHITE PAPER: Access this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM
101 - 125 of 1972 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement