IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
26 - 50 of 2111 Matches Previous Page  |  Next Page
Wyse vWorkspace Interactive Brochure
sponsored by Dell, Inc.
BROCHURE: This informative brochure examines a complete desktop virtualization solution software and highlights specific features that address security and mobility.
Posted: 19 Mar 2015 | Published: 03 Feb 2015

Dell, Inc.

How to leverage desktop virtualization in finance
sponsored by Dell, Inc.
WHITE PAPER: Access this informative white paper to explore four scenarios in which VDI is well suited to meet the special requirements and budgetary constraints of data centers in finance.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Why Healthcare Providers Seek Out New Ways To Manage and Utilize Big Data
sponsored by CyrusOne
WHITE PAPER: This white paper provides suggestions for how to manage healthcare data in ways that comply with HIPAA and HITECH, particularly how to manage big data volumes.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

CyrusOne

Tackling the Critical IT Challenges of Healthcare Reform
sponsored by CyrusOne
WHITE PAPER: This white paper gives you a roadmap for navigating the complex IT challenges of healthcare reform.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

CyrusOne

Tips for your move to VMware Horizon View
sponsored by VMware
WHITE PAPER: This informative resource highlights a technology that helps IT to tackle challenges from enterprise mobility by moving desktop assets into the data center, where IT staff can securely manage and deliver them to end users across any device. Find out 10 tips as you plan your move to virtual desktop infrastructure (VDI).
Posted: 17 Mar 2015 | Published: 31 Dec 2013

VMware

The VMware View Business Process Desktop
sponsored by VMware
WHITE PAPER: Inside this brief white paper, discover a technology that enables customers looking to outsource or offshore business processes to effectively scale their business on demand, streamline and centralize desktop management and provide end users with a secure desktop experience across the LAN and WAN.
Posted: 16 Mar 2015 | Published: 31 Dec 2012

VMware

Defend against data breaches with automated log management
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

As cloud adoption grows, securing cloud-based information a concern
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

Meet Health Industry Regulations and Secure Sensitive Health Files
sponsored by Ipswitch File Transfer
CASE STUDY: Access this case study to learn how one health insurance provider was able to securely manage, view and control all of their file transfer activity with an automated system.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

Log Management Solution for IT Big Data
sponsored by TIBCO Software Inc.
WHITE PAPER: Read this white paper to learn about a log management solution for compliance, security, and IT operations management.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TIBCO Software Inc.

Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Customer Video: Chiquita CIO
sponsored by Workday
WEBCAST: This video covers the solution Chiquita went with to solve some of their business problems and get relevant data on the value of every worker in the company.
Posted: 12 Mar 2015 | Premiered: Oct 19, 2014

Workday

Endpoint Security for OS X
sponsored by ESET
WHITE PAPER: This white paper introduces a comprehensive OS X security system that provides you with mixed environment endpoint security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Security Report: Cybercrime Trends for 2015
sponsored by ESET
WHITE PAPER: This security report can help the security professional know what the greatest threats are in 2015 and how to combat them.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ESET

Identify and Conquer Today's Backup Challenges
sponsored by SearchDataBackup.com
EBOOK: This white paper explains some of the toughest backup challenges facing IT professionals today including data growth and virtual servers. It goes over the ins and outs of backing up large volumes of data and talks about the importance backing up data for mobile devices due to the rise of popularity in BYOD.
Posted: 09 Mar 2015 | Published: 09 Mar 2015

SearchDataBackup.com

Enhance Your Storage Performance with Storage Virtualization
sponsored by Imation Corp.
WHITE PAPER: This white paper describes one storage virtualization system and how it can provide greater scalability, performance and resiliency.
Posted: 06 Mar 2015 | Published: 19 Dec 2013

Imation Corp.

Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

The Security Benefits of Software-Defined Storage
sponsored by DataCore Software Corporation
WHITE PAPER: Access this white paper to learn what the benefits of SDS are, including how it can help you prevent data loss.
Posted: 05 Mar 2015 | Published: 30 Sep 2014

DataCore Software Corporation

Using DLP Tools for Data Leakage Alerting and Preventive Actions
sponsored by Websense
EGUIDE: View this white paper to craft your DLP checklist to get the most out of the tools. Read on to learn how to use DLP for leak prevention.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Websense

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

How to Protect Intellectual Property Against Data Breaches
sponsored by Websense
EGUIDE: The stakes and costs are high for any breached organization; the key now is to plan.  View this expert e-guide to learn the steps to protecting IP.
Posted: 03 Mar 2015 | Published: 04 Feb 2015

Websense

What You need for an Effective DLP Deployment
sponsored by Websense
EGUIDE: Access this expert e-guide to learn the necessary features for a DLP solution and tips for success from organizations who encountered challenges when deploying their solutions.
Posted: 02 Mar 2015 | Published: 05 Nov 2014

Websense

Data Breach Protection Requires New Barriers
sponsored by Websense
EGUIDE: Access this eGuide to hear from security experts why a shift in perspective is needed, and why organizations can build better data breach protection by assuming the occurrence of a breach.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Websense

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM
26 - 50 of 2111 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement