IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
126 - 150 of 1958 Matches Previous Page  | Next Page
Protect Your Virtualized Environment with VMware vSphere Data Protection - What's New and Technical Walkthrough
sponsored by VMware, Inc.
WEBCAST: This webcast provides a technical walkthrough that covers the latest features and functionality for a solution purpose built for your small vSphere environment.
Posted: 04 Mar 2014 | Premiered: Mar 4, 2014

VMware, Inc.

Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 04 Mar 2014 | Published: 29 Aug 2013

Iron Mountain

Five Fundamentals of Virtual Server Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: Consult the following white paper to learn the 5 fundamentals of virtual server data protection that will ultimately ensure that your switch to data center virtualization will allot for the coveted cost-saving and agile benefits.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

CommVault Systems, Inc.

Executives Wise Up to Cloud Financial Apps
sponsored by SearchFinancialApplications
EBOOK: Today's executives no longer dwell on concerns of data privacy and security. Far more important is the business value and agility provided by SaaS financial systems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

SearchFinancialApplications

Get Smart About Big Data
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper to get more information on a solution that can help you extract maximum value from your information by converging backup and archiving.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

CommVault Systems, Inc.

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Managing Network Security Risks in Complex Environments
sponsored by Hewlett-Packard Company
WEBCAST: This informative webcast from Kenneth Yip, product manager from Hewlett-Packard, talks about the four steps to mitigating the risk of DDoS and how new technologies like Adaptive Web Application Firewalls can be leveraged to make you're your organization is protected from cyber-attack.
Posted: 26 Feb 2014 | Premiered: Feb 26, 2014

Hewlett-Packard Company

Managing BitLocker With SafeGuard Enterprise
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores a data protection platform that offers essential encryption functionalities that Microsoft Bitlocker's misses.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

Sophos, Inc.

A Legal Perspective of BYOD: Building Awareness to Enable BYOD and Mitigate its Risks
sponsored by ZixCorp
EBOOK: This informative e-book highlights the challenges that face organization when trying to manage their BYOD strategy and offers some information on handling those challenges.
Posted: 26 Feb 2014 | Published: 31 Jan 2014

ZixCorp

Security for Cloud Computing: 10 Steps to Ensure Success
sponsored by IBM
WHITE PAPER: This guide provides an essential reference for cloud security, offering information on the current cloud security landscape and assessing potential concerns.
Posted: 26 Feb 2014 | Published: 31 Dec 2012

IBM

Enabling SANLess SQL Server Failover Clusters in Amazon EC2 with DataKeeper Cluster Edition
sponsored by SIOS Technology Corp
WEBCAST: Access this on-demand webcast today to uncover top tips and best practices for enabling SANLess SQL Server failover clusters in Amazon EC2 cloud.
Posted: 26 Feb 2014 | Premiered: Feb 26, 2014

SIOS Technology Corp

Information Risk: Managing Digital Assets in a new Technology Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Limited

Understanding Big Data and Security
sponsored by Hewlett-Packard Limited
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Limited

Protect and Perform: Ensuring Online Business in Asia-Pacific
sponsored by Akamai Technologies
WHITE PAPER: This white paper underscores the importance of cyber-attack prevention, which can be attended to by a third-party supplier. Learn from those who have come before you as you read about a low-cost airline that found a third-party solution for their security needs.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Akamai Technologies

2013 Magic Quadrant for SIEM
sponsored by IBM
ANALYST REPORT: This Gartner Magic Quadrant highlights the top 16 SIEM vendors in the market today, and why many are offering threat intelligence and security analytics with their services.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and IntelĀ®

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER: This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012

IBM

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

ZixOne - A Technical Overview
sponsored by ZixCorp
WHITE PAPER: This guide highlights the security challenges associated with BYOD and gives a solution that improves security of corporate email on employee's personal devices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

ZixCorp

Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd
126 - 150 of 1958 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement