IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
226 - 250 of 2203 Matches Previous Page  | Next Page
Modernizing offsite VMware, Hyper-V data protection: Time to get rid of your tapes
sponsored by Veeam Software
WEBCAST: This webinar highlights the difficulties of maintaining outdaed backup approaches. It also highlights the benefits of Veeam Backup and Replication, a solution that provides flexible, reliable and fast recovery of virtualized applications and data.
Posted: 06 May 2014 | Premiered: Apr 10, 2014

Veeam Software

Keeping customer data secure will keep your reputation safe
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the industry-leading data governance, risk management and compliance tool specifically designed to protect your billing and CRM systems.
Posted: 06 May 2014 | Published: 27 Oct 2011

Informatica

Technical case study Steria and Veeam - three years later
sponsored by Veeam Software
WEBCAST: This case study highlights the partnership of Steria and Veeam. Together, they built a data center that could keep up with demands and manage big data in a complex, multitenant VMware vSphere environment.
Posted: 06 May 2014 | Premiered: Apr 15, 2014

Veeam Software

Select the right VMware, Hyper-V protection for a modern data center
sponsored by Veeam Software
WEBCAST: This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
Posted: 05 May 2014 | Premiered: Apr 17, 2014

Veeam Software

Security Testing For Financial Institutions
sponsored by Ixia
WHITE PAPER: Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.
Posted: 05 May 2014 | Published: 31 Jan 2014

Ixia

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer's Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 02 May 2014 | Published: 02 May 2014


ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

New data management tool will protect your nonproduction environments
sponsored by Informatica
DATA SHEET: Access this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
Posted: 02 May 2014 | Published: 04 Aug 2011

Informatica

Security Leadership Series: Security Strategies for Success
sponsored by Citrix
WHITE PAPER: This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends.
Posted: 01 May 2014 | Published: 01 May 2014

Citrix

MarketScope for Enterprise File Synchronization and Sharing
sponsored by Box
WHITE PAPER: This research analyzes the emerging market for enterprise file synchronization and sharing products as well as cloud-based services, which enable better productivity and collaboration for mobile workers and grant IT control with security and compliance capabilities.
Posted: 01 May 2014 | Published: 01 May 2014

Box

Snapshot Management – Ask the Educator Series
sponsored by CommVault Systems, Inc.
WEBCAST: This webinar goes over the downsides of legacy data backup and protection methods and highlights the benefits of Simpana IntelliSnap Technology,
Posted: 30 Apr 2014 | Premiered: Mar 5, 2014

CommVault Systems, Inc.

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Reduce Storage Costs with Enterprise Info Archiving
sponsored by CommVault Systems, Inc.
RESOURCE: This in-depth resource provided by Gartner evaluates 22 vendors in the enterprise info archiving market by highlighting their strengths, weaknesses, and completeness of vision. Read on to see where each vendor is headed, and which vendors to watch.
Posted: 30 Apr 2014 | Published: 11 Nov 2013

CommVault Systems, Inc.

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

Windows® XP Migration: Protect and Secure Critical Data
sponsored by CommVault Systems, Inc.
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Beginners guide: Tiered healthcare storage
sponsored by BridgeHead Software
EGUIDE: This expert e-guide from SearchHealthIT.com shares the basics behind using tiered storage for healthcare data, and how this affects HCOs' backup priorities.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

BridgeHead Software

Solve the Virtual Machine Backup and Recovery Challenge
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the challenges of backup and recovery for applications running on virtual machines. It also explains how VMware vSphere Data Protection is suited to handle these challenges and deliver more from virtualization efforts.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

VMware, Inc.

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper describes how enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Code42

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014

Neustar®

Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
sponsored by TigerText, Inc.
EGUIDE: This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

TigerText, Inc.

Healthcare Mobile Device Support Means Security Management
sponsored by TigerText, Inc.
EGUIDE: This expert e-guide from SearchHealthIT.com highlights two leading HCOs successful experiences with implementing secure BYOD programs. Click through to unveil 8 mobile device security tactics and policies to help you achieve similar results.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

TigerText, Inc.

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation
226 - 250 of 2203 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement