IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
101 - 125 of 2145 Matches Previous Page  |  Next Page
Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

Data Breaches in Europe
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The personal data of millions of Europeans have been compromised with 89% of the breaches the fault of corporations, according to this investigation by the Central European University.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

Cloud Deployment with Enterprise Endpoint Backup and File Sync/Share
sponsored by Code42
WHITE PAPER: Read this white paper to find out about a solution that allows organizations to select their preferred cloud deployment strategy while providing enterprise endpoint backup and file sync and share to meet industry standards for data security.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

BitGlass

Anittel Simplifies Managed Antivirus Service and Improves Customer Experience with Webroot
sponsored by Webroot
CASE STUDY: Anittel Group Ltd., a key managed service provider (MSP) to thousands of organizations, was experiencing an alarming amount of new and evolving malware across both personal and company devices. Learn about the endpoint protection tool that Anittel chose that was un-intrusive for its customers and highly responsive to the evolving malware landscape.
Posted: 08 Oct 2014 | Published: 30 Nov 2013

Webroot

How to Manage Data Security and Compliance Within an Enterprise
sponsored by IBM
WHITE PAPER: This white paper introduces a data security solution that puts an end to potential hackers and privileged insiders by eliminating unauthorized activity.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Continuous Monitoring for Data Access and Sensitive Information
sponsored by IBM
WHITE PAPER: This white paper highlights a simple, robust solution that assures the security and integrity of data in several environments, such as big data platforms.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Protect your SAP data environment with IBM InfoSphere Guardium
sponsored by IBM
BROCHURE: This white paper highlights a solution that allows you to build a database security platform that meets the challenges of the SAP data environment.
Posted: 06 Oct 2014 | Published: 31 Oct 2012

IBM

IBM Infosphere Guardium Vulnerability Assessment
sponsored by IBM
DATA SHEET: This resource highlights a vulnerability assessment solution that scans database infrastructures on a scheduled basis to detect vulnerabilities.
Posted: 06 Oct 2014 | Published: 30 Apr 2014

IBM

IBM InfoSphere Guardium for federal information systems
sponsored by IBM
DATA SHEET: This data sheet explains how continuous monitoring can secure sensitive data and simplify SCAP compliance validation.
Posted: 03 Oct 2014 | Published: 30 Apr 2013

IBM

What is the Dynamic Data Center?
sponsored by CA Technologies.
WHITE PAPER: Access this brief resource to learn how you can get on the path to a dynamic data center. You'll learn about System z, which provides central management of security, governance, cloud services, big data, and predictive analytics.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CA Technologies.

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

Proactively Address Regulatory Compliance Requirements and Protect Sensitive Data in Real Time
sponsored by IBM
WHITE PAPER: Learn how Hadoop is helping companies like yours tame big data, and uncover the data security and compliance concerns that accompany it.
Posted: 02 Oct 2014 | Published: 30 Apr 2013

IBM

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE: In this report conducted by Gartner, discover the major findings drawn from the debate between keeping patient information accessible or disclosed.
Posted: 01 Oct 2014 | Published: 27 Sep 2013

Absolute Software

Nasty Shadow IT Surprises for the Enterprise
sponsored by CipherCloud
RESOURCE: Check out this resource to learn about three shadow IT surprises that are capable of affecting your business.
Posted: 01 Oct 2014 | Published: 08 Sep 2014

CipherCloud

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

A New Blade Server Solution Built to Optimize Storage
sponsored by Dell, Inc.
VIDEO: View this video to explore the features and benefits of a compact, half-height blade server that's an excellent platform for your key workloads. You'll learn how this solution provides an array of storage options that enhance data protection and optimize performance while meeting the growing demands of your data center.
Posted: 01 Oct 2014 | Premiered: 07 Sep 2014

Dell, Inc.

PwC Germany Increases Storage Capacity and Reduces Energy Costs
sponsored by Fujitsu and NetApp
CASE STUDY: Check out the following case study to see how this company was able to increase storage capacities and reduce energy costs simultaneously.
Posted: 30 Sep 2014 | Published: 31 Dec 2013

Fujitsu and NetApp

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com
101 - 125 of 2145 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement