IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.Network administrators and anyone responsible for maintaining a secure database faces  … 
Definition continues below.
Data SecurityReports
1 - 25 of 1982 Matches Previous Page  | Next Page
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: These performance results show testing of 8 compteting security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
CASE STUDY: This brief case study shows how one organization deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Download PHD Virtual Backup for Hyper-V, Free for 15 days
sponsored by PHD Virtual
SOFTWARE DOWNLOAD: This free trial provides PHD Virtual Backup for Hyper-V, an easy to use, flexible and affordable offsite backup and archiving solution.
Posted: 18 Apr 2014 | Premiered: 18 Apr 2014

PHD Virtual

IBM FlashSystem Database Mirroring Best Practices
sponsored by IBM
WHITE PAPER: This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability.
Posted: 18 Apr 2014 | Published: 30 Apr 2013

IBM

Download Unitrends Enterprise Backup for Hyper-V, Free for 30 days
sponsored by PHD Virtual
SOFTWARE DEMO: This software trial download provides a fully functional enterprise data protection solution, featuring automated scheduling, forever incremental backups, global deduplication, instant recovery, archiving and more.
Posted: 18 Apr 2014 | Premiered: 18 Apr 2014

PHD Virtual

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Sophos, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Debunking the Myths: Cloud HA and DR
sponsored by SIOS Technology Corp
WHITE PAPER: Take a look at this resource to uncover 5 DR and HA in cloud deployment myths, so you can reduce the risk of downtime and data loss, and save big bucks.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

SIOS Technology Corp

Case Study - Firm foundations for an innovative hospital
sponsored by Bull
CASE STUDY: This case study tells how one Belgian hospital group implemented a converged infrastructure and saw benefits in terms of productivity, efficiency and security
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Bull

Take a Facts First Approach to E-Discovery
sponsored by Exterro
WHITE PAPER: This white paper delves into the e-discovery challenges faced by today's enterprises and provides practical steps for applying a "facts first" approach that both exceeds court expectations and reduces discovery costs.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

Exterro

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
WHITE PAPER: This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
WHITE PAPER: In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC

Security based on trust not fear
sponsored by Qualys
WHITE PAPER: This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Channel Edge Reseller Program
sponsored by Webroot
WHITE PAPER: This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Channel Edge MSP Program
sponsored by Webroot
WHITE PAPER: This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Protecting Privacy in Cross-Border Litigation
sponsored by Exterro
WHITE PAPER: For U.S.-based, multinational organizations, privacy statutes in foreign nations have become a minefield. This paper discusses the importance of proactively managing the use of ESI based in foreign countries during e-discovery.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

EMC Video Surviellance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

SIOS Technology Corp

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool
sponsored by EMC Corporation
PRODUCT OVERVIEW: Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Signature-less Malware Detection: Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats.
Posted: 15 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Stalking the Kill Chain
sponsored by EMC Corporation
WHITE PAPER: Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.
Posted: 15 Apr 2014 | Published: 31 Oct 2012

EMC Corporation
1 - 25 of 1982 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of instant messaging, P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk. Extrusion prevention software uses … 
Data Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement