IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.The concept of hard-drive  … 
Definition continues below.
Data Encryption Reports
1 - 25 of 213 Matches Previous Page  |  Next Page
GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 01 May 2017 | Published: 02 May 2017

ComputerWeekly.com

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Top 10 Reasons Quorum Beats the Competition
sponsored by QuorumLabs Inc.
PRODUCT REVIEW: Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

QuorumLabs Inc.

Case Study: Chen Financial
sponsored by Carbonite
CASE STUDY: This case study outlines how a small financial planning firm was able to find a cloud backup solution that provided protection for their sensitive financial data.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Carbonite

Waking Up From The Ransomware Nightmare
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper describes how ransomware attacks are on the rise, and how BDR is the real ransomware solution. Included in the white paper are 5 steps to taking control of your ransomware attack.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

QuorumLabs Inc.

Carbonite: A Cornerstone For Ransomware Protection And Recovery
sponsored by Carbonite
WHITE PAPER: Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day and this number is only increasing. In this white paper learn how to reduce exposure to ransomware and the best practices involved in recovering from ransomware attacks.
Posted: 30 Dec 2016 | Published: 31 Dec 2016

Carbonite

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Data Sovereignty Challenges
sponsored by VMware
WHITE PAPER: As countries adopt their own unique data sovereignty laws, its important companies remain cognizant of where their data is stored to avoid international ramifications. In this brief infographic, learn about the projected growth of cloud, international data flow and key steps countries have taken to instate compliance measures for data access.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

VMware

Managing Android devices in the enterprise
sponsored by ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by EOH IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

EOH IBM

The Value of Protecting Data in General, and Encrypting It in Particular
sponsored by IBM
WHITE PAPER: This white paper highlights a software-defined storage solution with built-in encryption capabilities that provides a single point of control for encryption throughout the storage layer. Read on and see how this solution can enhance your storage hardware offerings, ease management, and improve your data protection.
Posted: 07 Mar 2016 | Published: 31 Oct 2015

IBM

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com
1 - 25 of 213 Matches Previous Page    1 2 3 4    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  encryption is simple enough. When a file is written to the drive, it is automatically encrypted by specialized software. When a file is read from the drive, the software automatically decrypts it while leaving all other data on the drive encrypted. The encryption and decryption processes are transparent to all common applications such as word processors, databases, spreadsheets or imaging programs. A computer equipped with hard-drive encryption appears, from the user's point of view, to function as any other computer would.Windows Vista Enterprise and Ultimate editions offer a hard-drive encryption … 
Data Encryption definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement