IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
151 - 175 of 2332 Matches Previous Page  | Next Page
The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

BYOD Simplified Into 10 Steps
sponsored by Citrix
WHITE PAPER: Access this white paper to find out how to successfully use a BYOD program in the workplace with 10 simple steps.
Posted: 08 Sep 2014 | Published: 24 Jun 2014

Citrix

Improve Performance and Increase Value With A PC Refresh
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals three reasons to upgrade to new client systems in order to improve performance.
Posted: 08 Sep 2014 | Published: 29 Aug 2014

Dell, Inc. and Windows 8 Pro

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PRESENTATION TRANSCRIPT: This expert resource discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dyn

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn

Keys to a Successful BCM Program
sponsored by RSA, The Security Division of EMC
WEBCAST: Watch to discover how a centralized, automated approach to business continuity and disaster recovery planning allows you to respond swiftly in a crisis to protect your operations with the RSA Archer Business Continuity Management solution.
Posted: 05 Sep 2014 | Premiered: Sep 4, 2014

RSA, The Security Division of EMC

PCI DSS Questions Answered: Solutions To Tough Compliance Problems
sponsored by Pwine Express
WHITE PAPER: In this expert Q&A, get expert answers to the compliance and security issues that are most affecting the payment card industry today.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Pwine Express

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Avoid a Data Breach with Help from Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA, The Security Division of EMC

Best Practices Guide: Tools for Threat Intelligence and Incident Forensics
sponsored by DomainTools
WHITE PAPER: In this white paper, discover a suite of tools that can be used to identify the perpetrator of a cybercrime, build a profile of a cyber-attack, and proactively protect your data, infrastructure, and intellectual property.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

Securing Data at Rest with Encryption
sponsored by Amazon Web Services and Intel
WHITE PAPER: This white paper provides an overview of various methods for encrypting data at rest in Amazon Web Services (AWS).
Posted: 02 Sep 2014 | Published: 30 Nov 2013

Amazon Web Services and Intel

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC
151 - 175 of 2332 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement