IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data Security Reports
76 - 100 of 2149 Matches Previous Page  |  Next Page
Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

Infographic: The Rise of the Protection Storage Architecture
sponsored by EMC Corporation
RESOURCE: This infographic depicts the benefits of data protection storage architectures, which help to eliminate silos, consolidate data protection, and drive services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

Crump: Data Protection Challenges in a Mobile World
sponsored by Dell Software
EGUIDE: This expert e-guide takes a look at the various challenges associated with modern mobile technology.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Dell Software

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Identify Data Backup Solutions for Today’s Challenges
sponsored by Dell Software
EGUIDE: In this e-guide, explore these modern challenges with independent backup expert Brian Posey. This primer will present challenges such as backing up virtual servers, protecting large volumes of data and backing up mobile devices. Learn what challenges you must be aware of to ensure your data backup strategy is thorough.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Dell Software

How to Backup and Restore Oracle Database with IBM Storage
sponsored by IBM
WHITE PAPER: Read on to see how a software system is capable of creating point-in-time copies of databases and will greatly simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

There’s Never Been a Better Time to Virtualize
sponsored by VMware
WHITE PAPER: Access this white paper to learn more about the benefits of server virtualization. You'll learn about the benefits you can expect with virtualization, including, cost savings, streamlined manageability, maximized uptime, improved business continuity and security, and more.
Posted: 11 Nov 2014 | Published: 30 Jun 2014

VMware

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Buying Guide: Choosing Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

One Size Never Fits All: Optimizing your Organization with Backup Built for Your Business
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines why the "one-size-fits-all" may not be the best approach for data backup and how it can potentially cause IT departments to over-pay or under-protect. You'll also learn about a data protection platform that provides uniquely tailored tools for physical, virtual and cloud workloads across almost any OS environment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell, Inc.

Zero Data Loss Recovery Appliance: Reinventing Database Protection
sponsored by Oracle Corporation
WEBCAST: View this informative webcast that dives deep into a recovery appliance that provides data protection for your always-on business. Learn about the unique benefits of this appliance, such as database protection as a service.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Oracle Corporation

Fortify Your Mobile Device Data Protection Efforts
sponsored by SearchDataBackup.com
EBOOK: Assuming that end users aren't keeping much data on their endpoint devices is a losing proposition. Perhaps more importantly, it's a risk that IT administrators cannot afford to take.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchDataBackup.com

Strangers in Your Servers: Make Working with IT Contractors More Secure
sponsored by ObserveIT
WHITE PAPER: Access this white paper to learn about a solution that keeps an eye on users consistently.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

Information Security ANZ November 2014
sponsored by SearchSecurity.com
EZINE: Australia's traditional teaching pathways are struggling to produce candidates with the right skills for today's rapidly-changing cyber-security climate.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

SearchSecurity.com

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 03 Nov 2014 | Published: 18 Sep 2014

Cisco Systems, Inc.

Scale-out systems that put data to work
sponsored by IBM
WHITE PAPER: This resource highlights a solution that is the first generation of systems with processors designed for Big Data.
Posted: 31 Oct 2014 | Published: 17 Apr 2014

IBM

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

Data Protection - More than just backup and recovery
sponsored by Hewlett-Packard Limited
WEBCAST: Modern data protection is more than just backup and recovery. What do you need to make sure enterprise data is safe, accurate, and secure? View this webcast to find out, and take a look at a tool from Ovum Research that can help you choose the right data protection technology.
Posted: 25 Oct 2014 | Premiered: Sep 23, 2014

Hewlett-Packard Limited

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
76 - 100 of 2149 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement