IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
1 - 25 of 2340 Matches Previous Page  | Next Page
Addressing Storage and Backup Woes with the Cloud
sponsored by Nexenta
EGUIDE: In this expert e-guide, examine how two universities are addressing the various challenges associated with large data backups and storage. Learn how these organizations are leveraging the cloud to keep data secure and retrievable and the various benefits cloud can provide such as elasticity.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Nexenta

Data Protection for EMC VSPEX Proven Infrastructure
sponsored by EMC & Arrow
WHITE PAPER: This white paper discusses the data protection considerations that enterprises currently face and introduces EMC's innovative data protection technologies for VSPEX Proven Infrastructures.
Posted: 24 Nov 2014 | Published: 27 Nov 2013

EMC & Arrow

EMC Hybrid Cloud with VMware: Data Protection Disaster Recovery Solution Guide
sponsored by EMC & Arrow
WHITE PAPER: This solution guide describes the architecture, features, and functionality of a disaster recovery solution for EMC Hybrid Cloud that enables customers to build an enterprise-class, scalable, multitenant infrastructure.
Posted: 20 Nov 2014 | Published: 31 Oct 2014

EMC & Arrow

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

Infographic: The Rise of the Protection Storage Architecture
sponsored by EMC Corporation
RESOURCE: This infographic depicts the benefits of data protection storage architectures, which help to eliminate silos, consolidate data protection, and drive services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

SQL Server 2014 & the Data Platform
sponsored by Insight
WHITE PAPER: Access this white paper to learn more about the performance, insights, and the hybrid cloud platform that SQL Server 2014 can deliver. You'll learn how this approach delivers, enhanced security and scalability, an easy on-ramp to the cloud, the ability to search, access, and shape internal and external data, and more.
Posted: 18 Nov 2014 | Published: 31 May 2013

Insight

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Overcoming the Top 7 Challenges of Backup Compliance
sponsored by APTARE
WHITE PAPER: This white paper outlines 7 top compliance challenges that companies face in implementing SOX guidelines.
Posted: 17 Nov 2014 | Published: 28 Jun 2013

APTARE

Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

Crump: Data Protection Challenges in a Mobile World
sponsored by Dell Software
EGUIDE: This expert e-guide takes a look at the various challenges associated with modern mobile technology.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Dell Software

Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: Security in a fast-paced world cries for an "invest once and deploy everywhere" approach. Learn how to achieve it.
Posted: 14 Nov 2014 | Published: 31 Jul 2014

IBM

When Worlds Collide: Cloud Apps and Financial Services
sponsored by BitGlass
WHITE PAPER: Read this white paper to learn how to tackle the two major hurdles that businesses must clear when moving financial data to public cloud applications: Security and compliance regulations.
Posted: 14 Nov 2014 | Published: 14 Nov 2014


Global Real Estate Firm Gets a New Lease on Business Continuity with Veeam
sponsored by Veeam Software
WHITE PAPER: This whitepaper examines how the global real estate firm CBRE Group, Inc. was able to come up with a solution that not only filled the gaps left unaddressed by their legacy backup solution for reliable availability, but also allowed them to optimize their WAN connectivity at the same time.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Veeam Software

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Identify Data Backup Solutions for Today’s Challenges
sponsored by Dell Software
EGUIDE: In this e-guide, explore these modern challenges with independent backup expert Brian Posey. This primer will present challenges such as backing up virtual servers, protecting large volumes of data and backing up mobile devices. Learn what challenges you must be aware of to ensure your data backup strategy is thorough.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Dell Software

Achieving security with cloud data protection
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this whitepaper to learn about hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. It focuses on security, privacy, and cost savings to provide more than cloud storage, but also enterprise cloud security.
Posted: 13 Nov 2014 | Published: 11 Feb 2013

Hewlett-Packard Limited

Measuring ROI for Online Backup & Recovery
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn about the savings you'd see with a move to cloud data protection. You'll get insight into how you can avoid the operational costs of server backup and recovery by investing in cloud server data protection. You'll also learn how cloud data protection is better suited for meeting modern backup and recovery demands.
Posted: 13 Nov 2014 | Published: 16 Aug 2011

Hewlett-Packard Limited

How to Backup and Restore Oracle Database with IBM Storage
sponsored by IBM
WHITE PAPER: Read on to see how a software system is capable of creating point-in-time copies of databases and will greatly simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

Close the Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper explores the results of a recent Forrester study of 180 security leaders on the current state and effectiveness of vulnerability management.
Posted: 12 Nov 2014 | Published: 28 Feb 2014

Tenable Network Security

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh
1 - 25 of 2340 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement