IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
51 - 75 of 2001 Matches Previous Page  | Next Page
Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
WHITE PAPER: This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

BlackBerry

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration.
Posted: 10 Apr 2014 | Published: 30 Jun 2013

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Enabling the Business with Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: Social media is quickly becoming a key part of enterprise business strategy. According to an IDG Research survey, 73% of respondents expect it to be critical or very important in the coming years. So how can CIOs prepare for and encourage the adoption of social media in the enterprise in a secure, compliant way?
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Hootsuite

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
sponsored by Gartner
BROCHURE: Access the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Gartner

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Expert Advice – 20 Practical Tips on Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource reveals 20 single sign-on (SSO) and strong authentication implementation tips from your successful peers.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

IDC Report: Simplifying Data Protection for Virtual Environments
sponsored by PHD Virtual
WHITE PAPER: This IDC Vendor Profile discusses the firm PHD Virtual Technologies and its virtualized data protection solutions. In addition, this document examines PHD's supplier profile and strategy as well as some of the challenges PHD could encounter as it tries to differentiate itself in a market that is getting increasingly competitive.
Posted: 10 Apr 2014 | Published: 31 Dec 2012

PHD Virtual

Healthcare Disaster Recovery
sponsored by BridgeHead Software
WHITE PAPER: This white paper guides you through healthcare data basics to help you better understand what exactly you need to protect. Click now to discover backup and disaster recovery best practices to ensure always-on data availability and minimal downtime.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

BridgeHead Software

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Confidential Collaboration: How to manage regulatory compliance & data privacy while keeping your data safe
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers 4 key recommendations on how to maintain regulatory compliance while using collaborative processes.
Posted: 09 Apr 2014 | Published: 31 Oct 2013

IntraLinks, Inc

VNA Does Not Equal Image Availability: What You Need to Know
sponsored by BridgeHead Software
WHITE PAPER: This white paper highlights the steps needed to successfully implement vendor neutral archives (VNAs) that ensure data availability and protection.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

BridgeHead Software

Webinar Transcript: VNA Does Not Equal Image Availability, What You Need to Know
sponsored by BridgeHead Software
WHITE PAPER: In this white paper, Sturdy Memorial's PACS administrator shares insight on their experience implementing a vendor neutral archiving (VNA) equipped with image protection capabilities. Learn what you should look for when choosing a VNA solution.
Posted: 09 Apr 2014 | Published: 18 Dec 2012

BridgeHead Software

The New Workplace: Supporting Bring your own device
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Get With The Times: Hospitals Need to Update Data Storage Practices
sponsored by Iron Mountain
WHITE PAPER: This brief resource offers 3 healthcare data storage best practices to best manage and secure growing and changing records.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Iron Mountain

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

Mobile Application Security Chaos
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: 08 Apr 2014 | Premiered: Apr 8, 2014

Hewlett-Packard Company

Confidence, ownership and visibility: Mapping the road ahead for data governance
sponsored by IBM
WHITE PAPER: In this report from the 2013 first annual summit of the Data Governance Forum, take a look at the highlights of the event and get key summaries from presentations given by data governance experts in both public- and private-sector organizations.
Posted: 08 Apr 2014 | Published: 30 Sep 2013

IBM

Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM

Top Reasons to Choose EMC Isilon for Business Analytics
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 30 Mar 2012

EMC & Arrow

EMC Isilon Scale-Out NAS for In-Place Hadoop Data Analytics
sponsored by EMC & Arrow
WHITE PAPER: This is a thorough guide to the benefits of Isilon from EMC. It gives the benefits that this scale-out NAS solution can have in terms of analytics as well as efficiency and reliability.
Posted: 04 Apr 2014 | Published: 29 Nov 2013

EMC & Arrow
51 - 75 of 2001 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement