Enterprise Data Protection

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Readers' Choice Awards 2012

    For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.

  • Log management and analysis: How, when and why

    In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture.

  • Preventing Web database access with a triple-homed firewall

    Mike Chapple discusses database security best practices and how to protect against unauthorized Web access by using a triple-homed firewall.

  • Data breach prevention strategies

    This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organization's unique criteria; what access controls and audit capabilities that must be in place; what essential technologies you need to secure data; and the key security program elements that can prevent a security lapse from becoming a security breach.

  • Security School: Network content monitoring must-haves

    In this new lesson, expert Mike Chapple explores how to best prioritize and strategize for data protection investments to protect key content.

  • Adopt Zero Trust to help secure the extended enterprise

    Forrester Analyst John Kindervag explains Zero Trust Model and how it can be applied to protect data in today’s extended enterprise.

  • Symantec acquires LiveOffice for online data archiving

    Symantec said the $115 million-dollar deal boosts its e-discovery business and offer security and antispam capabilities for on-premise and hosted email.

  • Metadata security and preventing leakage of sensitive information

    Without accounting for metadata security, sensitive document data can easily be extracted. Mike Chapple explores technologies to support metadata security.

  • Network Content Monitoring

    Technologies that monitor how data moves in and out of organizations are rapidly intersecting. Data loss prevention, digital rights management and database activity monitoring, just to mention a few, all have overlapping functions and purposes not only to secure data but to help organizations with their compliance mandates. In this security school, you’ll learn about these intersections and how to best prioritize and strategize for your data protection investments.

  • EDRM-DLP combination could soon bolster document security management

    The integration of enterprise digital rights management solutions and data loss prevention tools could bring a level of automation to document security management.

  • VIEW MORE ON : Database Security Management