IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
26 - 50 of 2107 Matches Previous Page  |  Next Page
The Effectiveness of a SIEM System According to IT Professionals
sponsored by IBM
WHITE PAPER: The following document profiles how IT professionals rate one possible SIEM solution.
Posted: 05 Feb 2015 | Published: 28 Feb 2014

IBM

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Ratings and Rankings for Security Forensics Tools
sponsored by IBM
WHITE PAPER: The following report reviews and rates seven security analytics programs, revealing which tools have been proven to reduce false positives and detect threats quickly and accurately.
Posted: 05 Feb 2015 | Published: 01 Jul 2014

IBM

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Preventing Data Breaches Made Possible with Data Breach Discovery
sponsored by BitGlass
WHITE PAPER: Consult the following white paper to learn how by using proprietary risk intelligence and Big Data analytics, the Data Breach Discovery system by Bitglass can offer a formidable defense against new age data breaches.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: In this exclusive series of security-based articles, IT experts examine and discuss the keys to creating a comprehensive security strategy that keeps all enterprise endpoints secure – as well as the pitfalls that can leave an organization vulnerable.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

SearchEnterpriseDesktop

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009

LTO

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

Why Fighting Cybercrime Requires Thinking Like the Bad Guys
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll find out how to safeguard your business by changing the way you invest in and think about security – from the perspective of the cyberthreats targeting you.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Hewlett-Packard Company

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM
26 - 50 of 2107 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement