IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
76 - 100 of 2005 Matches Previous Page  | Next Page
EMC Isilon Scale-Out NAS for In-Place Hadoop Data Analytics
sponsored by EMC & Arrow
WHITE PAPER: This is a thorough guide to the benefits of Isilon from EMC. It gives the benefits that this scale-out NAS solution can have in terms of analytics as well as efficiency and reliability.
Posted: 04 Apr 2014 | Published: 29 Nov 2013

EMC & Arrow

Mobile Application Security Study
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

Top 10 Reasons to Choose EMC Isilon for Hadoop Analytics
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC & Arrow

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Simple, Reliable, and Speedy Data Backup
sponsored by Storage-Experten
DATA SHEET: This concise data sheet reveals a data backup solution that has bundled OS, application, storage and licensing to lower the cost of backup for small-to-midsized businesses (SMBs).
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Storage-Experten

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Application Performance for Oil and Gas Seismic Analysis
sponsored by Dot Hill Systems Corp.
WHITE PAPER: The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.
Posted: 04 Apr 2014 | Published: 14 Mar 2014

Dot Hill Systems Corp.

Top 5 Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC & Arrow
DATA SHEET: Access this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.
Posted: 04 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

Data Security Through the Cloud
sponsored by Cisco Systems, Inc.
RESOURCE: The combination of cloud computing and mobility is often the perfect storm for security threats. Check out this blog post to learn about the threats that could be facing your data stored in the cloud, and how to overcome 2014's top cloud security challenges.
Posted: 03 Apr 2014 | Published: 06 Mar 2014

Cisco Systems, Inc.

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Windows To Go: Empower And Secure The Mobile Workforce
sponsored by Imation Corp.
WHITE PAPER: Check out this exclusive white paper to discover how two industry-leading vendors' products are working together to provide easier mobile computing, data protection and security that you need – at an affordable price.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Imation Corp.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

CW Europe – April 2014 Edition
sponsored by ComputerWeekly.com
EZINE: This edition of CW Europe looks at data protection in Europe after PRISM, asking what the new EU data protection regulation is about and how it could affect your business. CW Europe's security editor asked industry experts their opinion how the controversial reform and how it could affect the region.
Posted: 03 Apr 2014 | Published: 04 Apr 2014

ComputerWeekly.com

Marienhospital Medical Professionals Improve Care With Mobile Clinical Computing
sponsored by Dell, Inc.
WHITE PAPER: This case study highlights a leading German hospital's success with mobile clinical computing that improved data availability across the facility.
Posted: 02 Apr 2014 | Published: 30 Nov 2012

Dell, Inc.

Quantum Corporation Solution Guide: The Changing Role of Tape
sponsored by Quantum Corporation
WHITE PAPER: This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data.
Posted: 02 Apr 2014 | Published: 31 Oct 2009

Quantum Corporation

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Top 7 Use Cases for Business-Class Cloud File Sync
sponsored by eFolder
WHITE PAPER: This white paper describes the seven key areas where business-class cloud file sync can deliver value for virtually any organization, no matter size or industry. In an increasingly mobile world, providing documents that are in sync at all time is vital, and cloud file sync can deliver that.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

eFolder

EMC’s Flash Strategy
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores why one industry leader is doubling down on its investment in flash in order to drive dramatic and necessary change by developing a comprehensive flash portfolio built to fit a wide array of situations.
Posted: 01 Apr 2014 | Published: 29 Mar 2013

EMC & Arrow

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

6 Steps to Protect Your Intellectual Property
sponsored by Websense
WHITE PAPER: In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense
76 - 100 of 2005 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement