IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
151 - 175 of 2005 Matches Previous Page  | Next Page
Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer’s Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 14 Mar 2014 | Published: 19 Mar 2014


Identify and Conquer Today's Backup Challenges
sponsored by SearchDataBackup.com
EBOOK: This white paper explains some of the toughest backup challenges facing IT professionals today including data growth and virtual servers. It goes over the ins and outs of backing up large volumes of data and talks about the importance backing up data for mobile devices due to the rise of popularity in BYOD.
Posted: 14 Mar 2014 | Published: 19 Mar 2014

SearchDataBackup.com

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

CommVault Systems, Inc.

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash
sponsored by Dell, Inc.
WHITE PAPER: Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Dell, Inc.

LogicMonitor Free Trial Request
sponsored by LogicMonitor
TRIAL SOFTWARE: Download this 2-week free trial of a hosted monitoring architecture to solve your monitoring problems with a single Collector.
Posted: 10 Mar 2014 | Premiered: 10 Mar 2014

LogicMonitor

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data

2014 HIMSS Analytics Report: Navigating the Health IT Archiving and Data Management Challenge
sponsored by Iron Mountain
WHITE PAPER: This report highlights survey results that indicate healthcare IT's need for a well-rounded data storage and archive strategy given the growth in information.
Posted: 07 Mar 2014 | Published: 28 Feb 2014

Iron Mountain

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CommVault Systems, Inc.

Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Buyer's Checklist to Deduplicating Backup Systems
sponsored by ExaGrid Systems, Inc.
EBOOK: This guide provides information to organizations who aren't sure of what to look for in a deduplicating backup system.
Posted: 04 Mar 2014 | Published: 05 Mar 2014

ExaGrid Systems, Inc.

Protect Your Virtualized Environment with VMware vSphere Data Protection - What's New and Technical Walkthrough
sponsored by VMware, Inc.
WEBCAST: This webcast provides a technical walkthrough that covers the latest features and functionality for a solution purpose built for your small vSphere environment.
Posted: 04 Mar 2014 | Premiered: Mar 4, 2014

VMware, Inc.

Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 04 Mar 2014 | Published: 29 Aug 2013

Iron Mountain

Five Fundamentals of Virtual Server Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: Consult the following white paper to learn the 5 fundamentals of virtual server data protection that will ultimately ensure that your switch to data center virtualization will allot for the coveted cost-saving and agile benefits.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

CommVault Systems, Inc.

Executives Wise Up to Cloud Financial Apps
sponsored by SearchFinancialApplications
EBOOK: Today's executives no longer dwell on concerns of data privacy and security. Far more important is the business value and agility provided by SaaS financial systems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

SearchFinancialApplications

Get Smart About Big Data
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper to get more information on a solution that can help you extract maximum value from your information by converging backup and archiving.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

CommVault Systems, Inc.

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

IBM Reputational Risk Index
sponsored by IBM
WHITE PAPER: Access this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM

Addressing the Broken State of Backup with a New Category of Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
NEWSLETTER: This guide provides best practices for modern backup architecture are well as information on a disk-based backup solution that is built to handle the challenges of backup.
Posted: 04 Mar 2014 | Published: 28 Feb 2014

ExaGrid Systems, Inc.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®
151 - 175 of 2005 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement