IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
76 - 100 of 2294 Matches Previous Page  |  Next Page
Rethink Branch IT
sponsored by Riverbed Technology, Inc.
WEBCAST: In this webcast, learn from several IT professionals about the state of IT in supporting branch and remote locations—the critical front lines of your business.
Posted: 05 Jun 2015 | Premiered: Jun 5, 2015

Riverbed Technology, Inc.

Protect Information Like a Pro: A Guide for Enterprise CIOs
sponsored by Clearswift
EGUIDE: This CIO essential guide teaches you how to protect information and is designed to give IT leaders strategic management and decision-making advice.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Clearswift

Delivering 3D Graphics from the Cloud
sponsored by NVIDIA/VMware
VIDEO: This video highlights how to deliver 3D graphics from the cloud by using a VDI paired with a virtual GPU approach. Watch now to find out the benefits your organization can see with this technology.
Posted: 04 Jun 2015 | Premiered: 31 Dec 2014


Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: This resource describes how investing in a platform that integrates data backup, retention, search and access can provide a more holistic and integrated data management system.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Commvault

5 Important Questions to Ask Before You Renew with Your Legacy Backup Software
sponsored by Commvault
WHITE PAPER: This resource discusses the five questions every storage professional needs to ask themselves before deciding to renew their old data backup software.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

NVIDIA Grid Brings Security and Flexibility to Tofas
sponsored by NVIDIA/VMware
CASE STUDY: Access this case study to learn how one organization implemented NVIDIA GRID technology built on VMware VDI technology. Find out the benefits they saw as a result of implementing this approach.
Posted: 01 Jun 2015 | Published: 31 Dec 2014


CISOs' Best Practices for Building Cloud Security Strategy with Confidence
sponsored by IBM
RESOURCE: This infographic presents the top 4 cloud security elements you need to include in your strategy. Continue reading to learn how to mitigate risk in your cloud environment whether it's SaaS, IaaS, or PaaS.
Posted: 01 Jun 2015 | Published: 17 Dec 2014

IBM

5 Strategies For Email Data Loss Prevention
sponsored by SilverSky
WHITE PAPER: This white paper outlines 5 best practices for preventing sensitive information leakage while staying compliant with rapidly evolving regulations. Continue reading to learn how to bolster your email security strategy.
Posted: 01 Jun 2015 | Published: 27 May 2015

SilverSky

Five Ways to Optimize Your Customer's Journey through the Contact Center
sponsored by Genesys
WHITE PAPER: In this white paper, discover the five steps you can take to make sure your customer's journey through your contact center is enjoyable from beginning to end.
Posted: 29 May 2015 | Published: 31 Dec 2014

Genesys

Top Reasons to Choose ViPR SRM and Transform Your Storage Department
sponsored by EMC
WHITE PAPER: View this white paper to access the top reasons to choose ViPR SRM and begin to transform your storage department.
Posted: 29 May 2015 | Published: 01 Sep 2014

EMC

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Data Protection for Modern Storage Environments
sponsored by EMC
WHITE PAPER: This white paper describes how storage automation and virtualization can lead to better data protection services.
Posted: 29 May 2015 | Published: 29 May 2015

EMC

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

Case Study: Community Bank Improves Both Security and Productivity
sponsored by Clearswift
CASE STUDY: Read this case study to discover how a community bank overhauled its e-mail security to ensure both data protection and employee productivity.
Posted: 28 May 2015 | Published: 06 May 2015

Clearswift

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Dissecting the Foundation of an Adaptive Data Loss Prevention Strategy
sponsored by Clearswift
WHITE PAPER: This white paper reveals the foundation of adaptive data loss prevention strategy.
Posted: 26 May 2015 | Published: 30 Apr 2015

Clearswift

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

Cybersecurity 101: What Coporate Boards Should be Doing
sponsored by Trend Micro
WHITE PAPER: Download and discover how executives can start making a significant impact on enterprise cybersecurity, ensuring that valuable enterprise data is safe from hackers.
Posted: 26 May 2015 | Published: 26 Sep 2014

Trend Micro

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security
76 - 100 of 2294 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement