IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
101 - 125 of 2215 Matches Previous Page  | Next Page
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

The New Mobile Security Agenda
sponsored by Accellion, Inc.
WHITE PAPER: This resource offers key recommendations for enhancing mobile security strategies to avoid business risk and disaster.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Business Continuity with Violin’s Concerto™ 7000 All Flash Array
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs.Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

How to Implement Next Generation Architecture
sponsored by CA ARCserve
WHITE PAPER: This white paper explains trends and challenges that customers may have when facing issues with data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

CA ARCserve

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

MidWestern Community Bank Defends Againts Online Attacks
sponsored by Juniper Networks, Inc.
CASE STUDY: This case study examines a Midwestern community bank that has experienced DDoS attacks coming from a foreign country.
Posted: 27 Jun 2014 | Published: 31 Jan 2014

Juniper Networks, Inc.

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

DDOS Secure - DDoS Mitigation for Your Network and Critical Applications
sponsored by Juniper Networks, Inc.
DATA SHEET: This resource stresses the importance of a fully automated application-layer of protection, and touches upon the necessary security architecture.
Posted: 27 Jun 2014 | Published: 30 Nov 2013

Juniper Networks, Inc.

Information Security ANZ July 2014
sponsored by SearchSecurity.com
EZINE: This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014

SearchSecurity.com

Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014

SearchSecurity.com

HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

HP Simply StoreIT Virtualization Solution ChalkTalk
sponsored by HP and Intel
WEBCAST: This program makes choosing the right storage products easy. Your storage solutions will become simple to manage, affordable, and reliable. Click to watch a short video that provides ways to make data storage simpler.
Posted: 26 Jun 2014 | Premiered: Mar 28, 2014

HP and Intel

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

How threat intelligence can give enterprise security the upper hand
sponsored by IBM
EGUIDE: In this e-guide, expert Nick Lewis, information security officer at Saint Louis University, covers the benefits of a threat intelligence strategy for enterprises, as well as how to integrate intel feeds with existing security programs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

Enhanced threat detection: The next (front) tier in security
sponsored by IBM
EGUIDE: This expert e-guide explains how useful threat detection can be for your business and what its capabilities consist of.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

Boosting your security against advanced persistent threats
sponsored by IBM
EGUIDE: This expert e-guide explains the necessary steps to take when developing a defense strategy for your network.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Holistic Data Protection
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: The following digital classroom environment intends to help businesses achieve a holistic data protection procedure by providing the advice needed to successfully manage backup, archiving, mobile workforce, cloud infrastructure, and more.
Posted: 24 Jun 2014 | Premiered: 14 Mar 2014

CommVault Systems, Inc.

Successful Application Security Testing for Agile Development
sponsored by Veracode, Inc.
WHITE PAPER: Find out how one leading vendor is working to provide only the best coding practices and application security testing, so businesses like you can make sure your applications are safe and secure.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Veracode, Inc.

Five Program Management Best Practices
sponsored by Veracode, Inc.
CASE STUDY: Find out how program management helped one company achieve a successful application security program.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Veracode, Inc.
101 - 125 of 2215 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement