IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
76 - 100 of 2100 Matches Previous Page  |  Next Page
3 Businesses Share Why They Chose Citrix XenDesktop Over VMware View
sponsored by Citrix
WHITE PAPER: This white paper explores three organizations who selected a desktop and application virtualization strategy that fit their needs from a single, easy to deploy platform. Find out the reasons behind their selection over other competitors and what factors they took into consideration.
Posted: 02 Jan 2015 | Published: 31 Dec 2013

Citrix

Top Reasons Why Data Protection and Availability For Microsoft SQL Server
sponsored by EMC Corporation
WHITE PAPER: Learn how to protect your SQL Server data.
Posted: 30 Dec 2014 | Published: 30 Nov 2014

EMC Corporation

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Securely Erasing Micron SATA SSD
sponsored by Micron Technology
WHITE PAPER: This white paper details how to securely erase data using SSDs.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Micron Technology

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by CommVault
WHITE PAPER: This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Mitigating User-Based Risks When Infrastructure Monitoring Falls Short
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

There’s Never Been a Better Time to Virtualize
sponsored by VMware
WHITE PAPER: Access this white paper to learn more about the benefits of server virtualization. You'll learn about the benefits you can expect with virtualization, including, cost savings, streamlined manageability, maximized uptime, improved business continuity and security, and more.
Posted: 11 Nov 2014 | Published: 30 Jun 2014

VMware

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Safeguard Business-Critical Resources with a Comprehensive Imaging and Printing Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Strangers in Your Servers: Make Working with IT Contractors More Secure
sponsored by ObserveIT
WHITE PAPER: Access this white paper to learn about a solution that keeps an eye on users consistently.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 03 Nov 2014 | Published: 18 Sep 2014

Cisco Systems, Inc.

Scale-out systems that put data to work
sponsored by IBM
WHITE PAPER: This resource highlights a solution that is the first generation of systems with processors designed for Big Data.
Posted: 31 Oct 2014 | Published: 17 Apr 2014

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Fortify Your Mobile Device Data Protection Efforts
sponsored by SearchDataBackup.com
EBOOK: Assuming that end users aren't keeping much data on their endpoint devices is a losing proposition. Perhaps more importantly, it's a risk that IT administrators cannot afford to take.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchDataBackup.com

Information Security ANZ November 2014
sponsored by SearchSecurity.com
EZINE: Australia's traditional teaching pathways are struggling to produce candidates with the right skills for today's rapidly-changing cyber-security climate.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

SearchSecurity.com
76 - 100 of 2100 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement