IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
51 - 75 of 2109 Matches Previous Page  |  Next Page
Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

eBook: How to Secure a Data Breach
sponsored by SafeNet, Inc.
EBOOK: This e-book describes what the future of data breaches will look like for organizations around the world, and lists the three major steps that all enterprises need to take in order to protect their sensitive data.
Posted: 15 Dec 2014 | Published: 30 Jun 2014

SafeNet, Inc.

Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER: This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014

SafeNet, Inc.

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

How BlackBerry Addresses BYOD Security Issues
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Building the Business Case for Mobile Communications
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

7 Ways to Improve How Your Healthcare Organization Communicates
sponsored by Vocera
WHITE PAPER: This exclusive white paper details the common challenges healthcare organizations face with communications and collaboration, plus more. Read on now.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vocera

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by CommVault
WHITE PAPER: This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Extend Your Security Strategy into the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Why the Centralization of Content is Critical to Cloud Security
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Addressing Storage and Backup Woes with the Cloud
sponsored by Nexenta
EGUIDE: In this expert e-guide, examine how two universities are addressing the various challenges associated with large data backups and storage. Learn how these organizations are leveraging the cloud to keep data secure and retrievable and the various benefits cloud can provide such as elasticity.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Nexenta

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
51 - 75 of 2109 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement