IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
201 - 225 of 2326 Matches Previous Page  | Next Page
Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private.
Posted: 13 Aug 2014 | Published: 18 Jul 2014

BlackBerry

Secure Communications and Care Coordination in Healthcare
sponsored by Imprivata
WEBCAST: Tune into this webcast to experience how mobility is drastically changing the way clinicians deliver patient care.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

Imprivata

Protect Your Data With a Strategic PC Refresh Solution
sponsored by HP Autonomy
WHITE PAPER: This resource highlights a backup solution that will ensure successful and streamlined PC refresh.
Posted: 11 Aug 2014 | Published: 31 Dec 2013

HP Autonomy

BYODs Dark Side Data Protection
sponsored by HP Autonomy
WHITE PAPER: This white paper explains how data protection issues can cause a lot of problems with BYOD initiatives. It also highlights one solution that helps secure the data on BYOD devices.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

HP Autonomy

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Sophos Mobile Security Threat Report
sponsored by Sophos, Inc.
WHITE PAPER: This mobile security threat report answers these questions, as it pinpoints what to expect in the near future with regard to mobile malware. Continue on to find 10 tips to secure your mobile users and prevent mobile malware infections on company or BYOD devices.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Sophos, Inc.

Maximise storage efficiency across the enterprise
sponsored by HP Autonomy
WHITE PAPER: This white paper describes one solution that provides federated deduplication and flexible deployment while meeting strict business SLAs and minimizing backup infrastructure related costs.
Posted: 08 Aug 2014 | Published: 31 Jan 2014

HP Autonomy

Why Cloud Backup? Top 10 reasons
sponsored by HP Autonomy
WHITE PAPER: Read on to find 10 reasons to move to the cloud for data backup and storage.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HP Autonomy

One campus card for Educational Institutions
sponsored by HID
WHITE PAPER: Click through to this white paper to discover the advantages of implementing a single campus card, including various security benefits to protect college campuses.
Posted: 05 Aug 2014 | Published: 12 Jun 2014

HID

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

There's Good Security and Then There's National Security
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about BlackBerry's top-tier line of defense, creating the ultimate end-to-end mobile security solution.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Enterprise Data Backup- The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: Read this whitepaper to find out about a backup offering designed to provide true peace of mind to organizations and an easily managed solution to IT teams.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

Rand Secure Data

Why You Need Backup and Disaster Recovery
sponsored by N-able Technologies
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

N-able Technologies

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Simple Steps to Prevent Data Theft
sponsored by HID
RESOURCE: This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Posted: 29 Jul 2014 | Published: 26 Jun 2014

HID

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by arcserve
WHITE PAPER: This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

arcserve

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM
201 - 225 of 2326 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement