IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
26 - 50 of 2145 Matches Previous Page  |  Next Page
Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

SQL Server 2014 – Big Benefits for Analytics: Part 1
sponsored by Insight
TRANSCRIPT: Learn from the experts as they discuss what a real end user needs for business analytics success and how SQL Server 2014 can help.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Insight

EMC Global Data Protection Index: Global Key Results & Findings
sponsored by EMC Corporation
WHITE PAPER: This informative resource presents the results of a recent survey on trends in enterprise data protection, which collected data from 3,300 IT leaders across 24 countries.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

EMC Corporation

It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

The Cloud Is More Secure Than Traditional IT Systems - Here's Why
sponsored by Dimension Data
EGUIDE: This expert guide explains why when it comes to cloud security, the physical location of your data matters less than the means of access.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Dimension Data

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

SQL Server 2014 – Big Benefits for Analytics: Part 1
sponsored by Insight
WEBCAST: Dive deep into what a real end user needs for business analytics success and find out how SQL Server 2014 can help.
Posted: 05 Jan 2015 | Premiered: Dec 19, 2014

Insight

3 Businesses Share Why They Chose Citrix XenDesktop Over VMware View
sponsored by Citrix
WHITE PAPER: This white paper explores three organizations who selected a desktop and application virtualization strategy that fit their needs from a single, easy to deploy platform. Find out the reasons behind their selection over other competitors and what factors they took into consideration.
Posted: 02 Jan 2015 | Published: 31 Dec 2013

Citrix

Top Reasons Why Data Protection and Availability For Microsoft SQL Server
sponsored by EMC Corporation
WHITE PAPER: Learn how to protect your SQL Server data.
Posted: 30 Dec 2014 | Published: 30 Nov 2014

EMC Corporation

Infographic: Expect the Unexpected
sponsored by Quest Systems
WHITE PAPER: Access this resource to learn how pre-disaster preparation determines survival. You'll get insight into how you can build and implement detailed recovery plans, automate recovery testing, seek proven expert help quickly, and more.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Quest Systems

Complimentary Workshop Offer: DR Workshop
sponsored by Quest Systems
WHITE PAPER: Access this white paper to learn how you can get prepared by working with experts in disaster recovery to develop a testing plan to prepare for the process of returning to normal operations following a data loss or disruption.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Quest Systems

How to Prepare For Private Cloud Construction
sponsored by Red Hat
EGUIDE: In this expert guide, you'll learn how to prepare for private cloud construction, and will ultimately come closer to deciding whether a private cloud is the right move for your organization.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Red Hat

Explore the State of Business Technology Resiliency
sponsored by Dell, Inc.
WHITE PAPER: Access this research report to learn more about the current state of business continuity and disaster recovery. You'll gain a better understanding of how other organizations are dealing with resiliency and get insight into which options to consider before planning future initiatives and investments.
Posted: 19 Dec 2014 | Published: 12 May 2014

Dell, Inc.

Cloud-Based Content Filtering Drives Productivity and Protects Against Threats
sponsored by AVG Technologies
SOFTWARE DEMO: This complimentary IT download will allow you to experience a reliable, automated, company-wide backup solution that will protect your customer's data while driving greater productivity.
Posted: 18 Dec 2014 | Premiered: 18 Dec 2014

AVG Technologies

Securely Erasing Micron SATA SSD
sponsored by Micron Technology
WHITE PAPER: This white paper details how to securely erase data using SSDs.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Micron Technology

Data Backup Types Explained Full, Incremental, Differential and Incremental-Forever Backup
sponsored by CTERA Networks
EGUIDE: This expert eGuide explains full, incremental, differential, and incremental-forever backup. It also details their benefits and drawbacks.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

CTERA Networks

Storage Security Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet StorageSecure, a network storage encryption appliance that protects data at rest.
Posted: 15 Dec 2014 | Published: 02 Jun 2011

SafeNet, Inc.

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

A Centralized Key Management Solution for Your Enterprise's Security Needs
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet KeySecure: A single, centralized platform for managing cryptographic content (keys and related data) and applications, capable of running in on premise, cloud, or hybrid environments.
Posted: 15 Dec 2014 | Published: 18 Jul 2014

SafeNet, Inc.

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

eBook: How to Secure a Data Breach
sponsored by SafeNet, Inc.
EBOOK: This e-book describes what the future of data breaches will look like for organizations around the world, and lists the three major steps that all enterprises need to take in order to protect their sensitive data.
Posted: 15 Dec 2014 | Published: 30 Jun 2014

SafeNet, Inc.

Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.
26 - 50 of 2145 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement