IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
201 - 225 of 2352 Matches Previous Page  | Next Page
Discover the Danger Behind the Heartbleed Bug
sponsored by Symantec Corporation
WHITE PAPER: Discover the dangers lurking within the Heartbleed bug, and learn how your organization should respond to it.
Posted: 28 Jul 2014 | Published: 21 Jul 2014

Symantec Corporation

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Posted: 28 Jul 2014 | Published: 30 Apr 2014

Fortinet, Inc.

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

FortiOS® 5 Network Security Operating System
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover the key features of an industry-leading, next-gen firewall option.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fortinet, Inc.

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
WHITE PAPER: View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to learn about the government's relationship with healthcare providers, and uncover insight for securing devices to protect sensitive data.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

RailCom Meets Client Needs While Ensuring Corporate Data and Device Security
sponsored by IBM
CASE STUDY: Read this case study to find out how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based mobile solution.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

IBM

Getting Big Value out of Big Data: The Update
sponsored by IBM
WHITE PAPER: To serve your enterprise well, data must be scaled with fewer resources and managed with speed and continuity. Read this white paper to compare storage platforms and their benefits so you can find a solution that can expand cost-effectively, respond quickly, and doesn't require additional training.
Posted: 24 Jul 2014 | Published: 30 Apr 2014

IBM

ActivID® Threat Detection Service
sponsored by HID
DATA SHEET: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This solution brief highlights the challenges organizations feel in the face of IT consumerization and BYOD trends. It also mentions one solution that improves the productivity of mobile file sharing without sacrificing security or compliance.
Posted: 21 Jul 2014 | Published: 31 Mar 2014

Acronis

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Avoid Disastrous Data Breaches with New Security Solutions
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Enterprise Mobility & BYOD: Four Biggest Challenges— And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Discover four key challenges associated with enterprise mobility and how to solve them usingthe most effective EMM solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

FrontRange Solutions Inc.

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

BlackBerry

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

Best Practices for Disaster Recovery Planning
sponsored by CommVault Systems, Inc.
WHITE PAPER: This expert e-guide explains the top 10 mistakes that organizations often make in terms of planning a disaster recovery process. It also gives tips on how to can avoid these mistakes as well as advice for selecting the proper operational scenario during disaster recovery testing to ensure a successful DR plan.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

CommVault Systems, Inc.

7 Benefits You Realize with a Holistic Data Protection Approach
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the 7 benefits of a holistic approach to data protection and highlights how legacy approaches struggle to keep up with modern demands.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

CommVault Systems, Inc.

Weather centre secures remote access with HID Global’s strong authentication
sponsored by HID
CASE STUDY: In this case study featuring The European Centre for Medium Range Weather Forecasts (ECMWF), forecasts are gathered through data from satellites, buoys, ships and aircrafts—and all facilities across Europe need to remotely access this information.
Posted: 11 Jul 2014 | Published: 25 Mar 2013

HID

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
201 - 225 of 2352 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement