IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
51 - 75 of 1313 Matches Previous Page  |  Next Page
Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Case Study: Buyer's Remorse No More
sponsored by Rapid 7
WHITE PAPER: Explore this case study to discover how a finance company, after being hacked, was able to secure incredibly sensitive client information by implementing a testing framework alongside a vulnerability management platform.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: Compliance, discovery and preservation are key drivers of the enterprise information archiving market. This Gartner report reveals strengths and cautions of different vendor's enterprise information archiving products as well as a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Proofpoint, Inc.

Data Center Virtualization Tools Need to Work Together
sponsored by Veeam Software
WHITE PAPER: On the path to full digital transformation, data center modernization continues to be a top-of-mind issue at most IT organizations. In order to achieve this, you need virtualization tools that complement each other. Access this white paper to learn why virtualization is the centerpiece of data center modernization and which tools to implement.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Veeam Software

The Real SaaS Manifesto
sponsored by Workday
WHITE PAPER: Learn how best to select and implement SaaS apps for key functions like human capital management and talent management.
Posted: 16 Nov 2017 | Published: 31 Dec 2016

Workday

Zero Impact Database Migration
sponsored by Quest
WHITE PAPER: Discover how to navigate the most common pitfalls of migrating from Oracle to SQL Server with tools that enable seamless data replication across platforms.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Quest

Why Organizations Still Struggle To Digitally Transform & Innovate
sponsored by Veeam Software
WHITE PAPER: An overwhelming majority are struggling with availability and protection gaps, which are leading to data loss, impeded operating environments, and delayed digital transformation efforts. Access this report for survey results on how organizations struggle to bridge these gaps and ways you can cross them.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Veeam Software

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

GDPR Quick Start Guide
sponsored by MarkLogic
WHITE PAPER: According to an Osterman Research Report, 64% of organizations are not ready to comply with the GDPR. This paper offers a quick start to GDPR with 3 key steps that will put you on the right track to maintaining GDPR compliance.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

MarkLogic

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Moving your Database to the Cloud
sponsored by Quest
WHITE PAPER: Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Quest

2018 Database DevOps Survey
sponsored by DBMaestro
WHITE PAPER: Inside, uncover key findings from DBmaestro's annual Database DevOps Report, along with the challenges and best practices of companies using or looking to implement DevOps for databases.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

DBMaestro

Demystifying Cloud Security
sponsored by Workday
WHITE PAPER: In the CIO.com report "Demystifying Cloud Security," you'll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Workday

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Need More Oomph from Oracle
sponsored by Oracle & Explorer
WHITE PAPER: Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Oracle & Explorer

6 GDPR Compliance Pitfalls & How to Avoid Them
sponsored by Collibra
WHITE PAPER: The GDPR is a complex regulation. And on the path to compliance, there will be unanticipated roadblocks. The good news is, you can find your way through them.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Collibra

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

HPE SimpliVity hyperconverged infrastructure for VMware vSphere
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous exponential data growth has lead to the need to replace legacy IT infrastructures, and is driving the recent hyperconverged infrastructure (HCI) adoption trend. This technical white paper reviews the features and benefits of an HCI platform and describes the hardware and software components and subsystems that make up the solution.
Posted: 15 Nov 2017 | Published: 31 Jul 2017

Hewlett Packard Enterprise

Data Protection on HCI Platforms
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Data protection is critical for disaster recovery and business continuity, and is one of the key evaluation markers for organizations purchasing IT infrastructure. This paper discusses HCI's impact on data protection, key factors to consider, data protection best practices and recommendations on when and how to use them for various use cases.
Posted: 07 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise
51 - 75 of 1313 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement