IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
51 - 75 of 2298 Matches Previous Page  | Next Page
Cloud Computing Security Up Close
sponsored by CDW Corporation
WHITE PAPER: Making practical and strategic decisions is the only effective way to secure your data in the cloud. Access this expert resource to get details on a variety of topics surrounding cloud security including protecting sensitive data, maintaining regulatory compliance, keeping track of data location and segregation, and more.
Posted: 01 Dec 2014 | Published: 26 Nov 2014

CDW Corporation

Getting IT Security Wrong Can Be Costly—How to Balance Investment with Risk
sponsored by Clearswift
WHITE PAPER: This white paper examines why so many executives take little interest in information security; why compliance needs to be combined with a more risk-based approach to security; the importance of creating a security-aware culture; and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Clearswift

Rethinking Data Discovery and Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses data discovery and classification, two essential but often overlooked initiatives that lay the foundation for protecting data. Read on to access a three-part framework for data security and control, created by Forrester to help S&R professionals adapt to the new data economy.
Posted: 26 Nov 2014 | Published: 01 Oct 2014

Digital Guardian

Customer Spotlight: Deploying a Data Protection Program in Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 26 Nov 2014 | Premiered: Nov 5, 2014

Digital Guardian

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

EMC Hybrid Cloud 2.5 with VMWare: Data Protection Continuous Availability Solution Guide
sponsored by EMC & Arrow
WHITE PAPER: This solution guide provides an introduction to data protection through continuous availability. It also discusses EMC's Hybrid Cloud solution, which empowers IT organizations to accelerate implementation and adoption of the hybrid cloud while still enabling customer choice for the compute and networking infrastructure within the data center.
Posted: 25 Nov 2014 | Published: 31 Oct 2014

EMC & Arrow

Securing your company's digital assets so they don't fall into the wrong hands
sponsored by K2
WHITE PAPER: Access this brief paper to learn how Square Enix Europe, a video game creator, improved the security of its mastering request process, which ultimately helped the company ensure top quality of its products.
Posted: 25 Nov 2014 | Published: 31 Dec 2013

K2

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Addressing Storage and Backup Woes with the Cloud
sponsored by Nexenta
EGUIDE: In this expert e-guide, examine how two universities are addressing the various challenges associated with large data backups and storage. Learn how these organizations are leveraging the cloud to keep data secure and retrievable and the various benefits cloud can provide such as elasticity.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Nexenta

Simple, Efficient, Flexible Data Protection for EMC VSPEX Proven Infrastructure
sponsored by EMC & Arrow
WHITE PAPER: This white paper discusses the data protection considerations that enterprises currently face and introduces EMC's innovative data protection technologies for VSPEX Proven Infrastructures.
Posted: 24 Nov 2014 | Published: 27 Nov 2013

EMC & Arrow

Disaster Recovery Solution Guide: EMC Hybrid Cloud 2.5 with VMware
sponsored by EMC & Arrow
WHITE PAPER: This solution guide describes the architecture, features, and functionality of a disaster recovery solution for EMC Hybrid Cloud that enables customers to build an enterprise-class, scalable, multitenant infrastructure.
Posted: 20 Nov 2014 | Published: 31 Oct 2014

EMC & Arrow

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

Infographic: The Rise of the Protection Storage Architecture
sponsored by EMC Corporation
RESOURCE: This infographic depicts the benefits of data protection storage architectures, which help to eliminate silos, consolidate data protection, and drive services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

SQL Server 2014 & the Data Platform
sponsored by Insight
WHITE PAPER: Access this white paper to learn more about the performance, insights, and the hybrid cloud platform that SQL Server 2014 can deliver. You'll learn how this approach delivers, enhanced security and scalability, an easy on-ramp to the cloud, the ability to search, access, and shape internal and external data, and more.
Posted: 18 Nov 2014 | Published: 31 May 2013

Insight

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Overcoming the Top 7 Challenges of Backup Compliance
sponsored by APTARE
WHITE PAPER: This white paper outlines 7 top compliance challenges that companies face in implementing SOX guidelines.
Posted: 17 Nov 2014 | Published: 28 Jun 2013

APTARE

Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

Crump: Data Protection Challenges in a Mobile World
sponsored by Dell Software
EGUIDE: This expert e-guide takes a look at the various challenges associated with modern mobile technology.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Dell Software

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
51 - 75 of 2298 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement