IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
26 - 50 of 2298 Matches Previous Page  | Next Page
Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Defeat Malware and Botnet Infections with a DNS Firewall
sponsored by BlueCat
WHITE PAPER: This paper reveals a threat protection solution that can help you address any holes in enterprise security.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

BlueCat

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Hightail for Enterprise: Security Overview
sponsored by Hightail
WHITE PAPER: This white paper outlines how Hightail can keep files secure, even with unsanctioned sharing tools.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

CBRE Asia Pacific Gets Business Continuity with Veeam
sponsored by Veeam Software
VIDEO: This short video details how CBRE, the world's largest commercial real estate services firm, worked with Veeam to become an "always-on" business with high availability and business continuity.
Posted: 05 Dec 2014 | Premiered: 07 Nov 2014

Veeam Software

4 Best Practices for Building PCI DSS Compliant Networks
sponsored by SolarWinds, Inc.
WHITE PAPER: This white paper reveals four recommendations for building PCI DSS compliant networks to secure consumer's payment card data.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

SolarWinds, Inc.

Protection for Every Enterprise: How BlackBerry® Security Works
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Building the Business Case for Mobile Communications
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

The Case for Mobile Medical Communications
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by CommVault
WHITE PAPER: This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

How Box is Securing Business Information in the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Top Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC Isilon
WHITE PAPER: This whitepaper lists the five top reasons to choose EMC Isilon for video surveillance.
Posted: 02 Dec 2014 | Published: 31 Aug 2014

EMC Isilon

Considerations for DR Testing and Disaster Preparation
sponsored by Symantec Corporation
EGUIDE: This expert e-guide discusses modern DR testing strategies and the technologies that are improving users' ability to conduct regular, effective DR tests. Learn about local versus remote DR testing and various considerations for each.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Symantec Corporation

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Security and Compliance for Scale-Out Hadoop Data Lakes
sponsored by EMC Isilon
WHITE PAPER: This whitepaper explains in detail how this scale-out NAS storage system provides a multiprotocol data lake that secure Hadoop data.
Posted: 02 Dec 2014 | Published: 31 Aug 2014

EMC Isilon

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

How Frequently Should you Conduct Failover Testing?
sponsored by Symantec Corporation
WHITE PAPER: This expert e-guide details the importance of failover testing for disaster recovery processes and possibly hurdles to regular testing such as time, personnel, or budgets.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Symantec Corporation

Four Steps to Incorporate Infrastructure Resources into your DR Plan
sponsored by Symantec Corporation
WHITE PAPER: In this e-guide, independent disaster recovery expert Paul Kirvan examines the four important steps required to incorporate critical infrastructure resources into your disaster recovery plan.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Symantec Corporation

How to Improve Disaster Recovery with Object Storage
sponsored by SwiftStack
WHITE PAPER: In this whitepaper, you'll discover two particular use cases in which object storage is changing the dynamics of disaster recovery.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

SwiftStack

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense
26 - 50 of 2298 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement