IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
51 - 75 of 2217 Matches Previous Page  |  Next Page
Protecting Your Digital Assets
sponsored by The Pulse Network
WEBCAST: This webisode of Digital Media Workstream reveals how you can secure your digital media assets. Learn from Robert Wong, who has 10 years of experience in content management, how to protect large files and share them with agility.
Posted: 19 Jun 2015 | Premiered: May 4, 2015

The Pulse Network

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

Shore Up Your Office365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Microsoft Office 365 suite including the security benefits and challenges you will encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

NetApp

Top Considerations for Defining a Successful BYOD Strategy
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn the 6 key tips that show you how to implement a BYOD strategy that can ultimately deliver the business benefits you're looking for.
Posted: 18 Jun 2015 | Published: 31 Jul 2014

Good Technology

What’s Stopping your Breakthrough IT Performance for End User Computing?
sponsored by Dell and Microsoft
RESOURCE: This informative resource highlights a platform designed to secure, manage, and protect all the endpoint devices in your organization – including laptops. Download now to discover how this platform optimizes end-users' performance and overall enhances the end-user computing environment.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Dell and Microsoft

How Can Snapshot Technology Best Be Used for Backups?
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explains how snapshots can be used for backups in certain circumstances and why the role of traditional backup software is changing.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Gaining Value Through Repurposing Backup and Archive Data
sponsored by Symantec Corporation
EGUIDE: This expert e-guide reveals whether backup and archive data can be mined for business analysis. Additionally, get a glimpse into the future of storage.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Modernizing Data Protection With Backup Appliances
sponsored by Symantec Corporation
WHITE PAPER: This white paper presents the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture.
Posted: 17 Jun 2015 | Published: 26 Mar 2014

Symantec Corporation

PBBAs Tap into Key Data Protection Trends to Drive Strong Market Growth
sponsored by Symantec Corporation
WHITE PAPER: View this white paper to get a good look at the PBBA market, the drivers of market development, and the key benefits these appliances offer enterprises.
Posted: 17 Jun 2015 | Published: 01 Oct 2014

Symantec Corporation

XtremIO Data Protection
sponsored by EMC Corporation
WHITE PAPER: This white paper highlights a data protection strategy and reveals its benefits and advantages over RAID (Redundant Array of Independent Disks), with special consideration given to the unique requirements of enterprise flash storage arrays.
Posted: 16 Jun 2015 | Published: 01 Jul 2014

EMC Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

Top Mobile Technology Tips for CIOs
sponsored by Kony
EGUIDE: In this expert guide, you'll discover the dos and don'ts for developing purpose-built mobile applications. In addition, read on to get a closer look into the mobile technology stack, including mobile app development, enterprise mobility management, mobile backup and data protection, and more.
Posted: 16 Jun 2015 | Published: 16 Jun 2015

Kony

Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

Enhance performance of graphics-intensive healthcare apps with integrated architecture
sponsored by Cisco Systems, Inc and Citrix
PRODUCT OVERVIEW: Access this resource to learn about a platform that is meeting the demanding requirements of healthcare by combining storage, networking, desktop virtualization, and graphics technologies to provide VDI with full graphics acceleration and enhance performance for EHR, PACS, and other graphics-intensive applications.
Posted: 11 Jun 2015 | Published: 29 May 2015

Cisco Systems, Inc and Citrix

Integrated architecture provides graphics-intensive apps for global collaboration
sponsored by Cisco Systems, Inc and Citrix
PRODUCT OVERVIEW: Access this informative resource to learn about a platform combining storage, networking, desktop virtualization and graphics technologies that deliver a complete virtual desktop solution with full GPU acceleration for graphics-intensive applications to enable global collaboration on design projects.
Posted: 11 Jun 2015 | Published: 29 May 2015

Cisco Systems, Inc and Citrix

5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.

Improve storage performance of multi-tier workloads with hybrid arrays
sponsored by Dell, Inc. and SanDisk®
PRODUCT OVERVIEW: Access this informative resource to learn about a unified storage platform that offers features for automating tiered storage across arrays and find out how this technology helps to improve storage performance and efficiency for specialized, multi-tiered workloads.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

Dell, Inc. and SanDisk®

Securing Big Data Environments
sponsored by Hortonworks
RESOURCE: This resource outlines a particular security platform that can centralize data access policies and key management to protect the entire big data environment, including structured and unstructured data sources. Read now to learn how your organization can protect your data by accessing this resource.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

5 Reasons Every MSP Should Sell SaaS Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper gives five reasons why MSPs need to take advantage of the growing need for SaaS environment data protection.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Datto, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Moving Beyond Your Mobile Blind Spot: An App Centric Approach to Enterprise Mobility
sponsored by Pulse Secure
WHITE PAPER: In this white paper, you'll learn how shifting the focus of a mobile strategy from device management to app-centric can improve user experience and workforce productivity while improving security.
Posted: 09 Jun 2015 | Published: 28 Mar 2014

Pulse Secure

Growing Data, Growing Danger: How To Reduce Breaches
sponsored by Micron Technology
RESOURCE: This helpful resource details how to protect data from potential breaches using SSD. Read on to get the facts about data security, and why all companies must put data protection at the top of their priorities.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Micron Technology
51 - 75 of 2217 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement