IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
151 - 175 of 2298 Matches Previous Page  | Next Page
Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

PwC Germany Increases Storage Capacity and Reduces Energy Costs
sponsored by Fujitsu and NetApp
CASE STUDY: Check out the following case study to see how this company was able to increase storage capacities and reduce energy costs simultaneously.
Posted: 30 Sep 2014 | Published: 31 Dec 2013

Fujitsu and NetApp

Financial Services Company Saves $5M Annually with iovation's Fraud Prevention Service
sponsored by iovation, Inc.
CASE STUDY: Discover how a major lending company uses device-based fraud prevention to protect customers and stop sophisticated loan fraud rings.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian

Six Reasons VDI + Data Protection Can Strengthen Your Security Posture
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover six reasons VDI and data protection can strengthen your security posture as a whole.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Real-Time Data and Analytics Transforming Finance
sponsored by Workday
EGUIDE: Learn from Robert Kugel and Kristina West about how in-memory technology and real-time data are transforming finance and current barriers to adoption.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Workday

IBM Infosphere Data Privacy for Hadoop
sponsored by IBM
WHITE PAPER: Find out about the IBM InfoSphere Data Privacy for Hadoop which can help businesses like you build confidence in big data.
Posted: 29 Sep 2014 | Published: 31 Jan 2014

IBM

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Electronics Retailer Reduces Order Fraud by 25% with iovation
sponsored by iovation, Inc.
WHITE PAPER: A major computer and electronics retailer fights back against identity theft and credit card fraud, by adding device intelligence into their fraud prevention strategy. Find out how it works behind the scenes.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

How to Protect Unstructured Data
sponsored by Digital Guardian
WHITE PAPER: This white paper outlines a data protection model that is used to control unstructured data by identifying and applying policy-based controls over the data's lifecycle.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

How Effective is Cloud-Provided Encryption?
sponsored by CipherCloud
RESOURCE: This blog post points out the issues surrounding cloud-provided encryption, and outlines why not all solutions are created equal.
Posted: 25 Sep 2014 | Published: 22 Jul 2014

CipherCloud

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

3 Threats to Cloud Data, and How to Address Them
sponsored by CipherCloud
RESOURCE: In this resource, uncover the three major threats to cloud computing according to the Cloud Security Alliance, and learn about the best ways to protect your organization against malicious threats.
Posted: 24 Sep 2014 | Published: 03 Jul 2014

CipherCloud

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Mutual Fund Giant Securely Encrypts Multiple Customer Applications in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features a Boston-based investment services company, and reveals how they made the switch to cloud applications successfully.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

English and French Collaboration Opens Education Cloud Portal to Many Countries
sponsored by CipherCloud
WHITE PAPER: This case study focuses on a UK educational organization who strives to create a secure portal in the cloud, compatible with global partners in order to access educational tools.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud
151 - 175 of 2298 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement