IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Multimedia (View All Report Types)
1 - 25 of 162 Matches Previous Page  |  Next Page
Virtual Workshop: Data Protection for the Cloud Era
sponsored by Druva Software
WEBCAST: Join this virtual workshop to learn how to manage and protect your enterprise workloads with a cloud-first data protection approach, granting you the ability to streamline DR across cloud, hybrid, and on-premises workloads, reduce the impact of ransomware, and more.
Posted: 22 Oct 2019 | Premiered: Oct 22, 2019

Druva Software

The Benefits of Modernizing Disaster Recovery with DRaaS
sponsored by Druva Software
WEBCAST: Watch this webinar to discover current trends in disaster recovery, the benefits of cloud-based data protection and DRaaS, why companies are considering SaaS data protection, and more.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

Druva Software

Data Resiliency Moves to the Cloud
sponsored by Druva Software
WEBCAST: The experts in the following webcast—Naveen Chhabra, Senior Analyst at Forrester Research, and Mike Palmer, Chief Product Officer at Druva—discuss the importance of data resiliency and market research findings for evaluating data resiliency providers. Tune in now for guidance on protecting your valuable data.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

Druva Software

Moving to SaaS: Considerations for Better Data Protection
sponsored by Druva Software
WEBCAST: Tune in to this webcast to learn the core benefits of SaaS data protection, how cloud-based data protection lowers TCO, insights into how you can do more with your backup data, and more.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

Druva Software

Unified Data Protection for Hybrid IT, Part 2
sponsored by Forcepoint
WEBCAST: In part two of the Unified Data Protection for a Hybrid IT World webinar series, take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint can help you meet your data protection needs.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

Forcepoint

Unified Data Protection for Hybrid IT: Part 1
sponsored by Forcepoint
WEBCAST: Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In this webinar, explore how companies should rethink data security by focusing on the 3 main principles including analytics-driven visibility, risk-adaptive controls and intelligence & dynamic automation.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Modernizing Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Protect Your Workforce Productivity
sponsored by Druva Software
WEBCAST: Watch this webinar to hear 3 industry experts discuss several best practices for protecting Office 365, 4 challenges to overcome, and data recovery options at your disposal—so you can ensure your environment is properly protected.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Druva Software

The Importance of Third-Party Backup for Office 365
sponsored by Druva Software
WEBCAST: Tune into the following webcast as Michael D. Osterman, President of Osterman Research, and W. Curtis Preston, Chief Technologist at Druva, break down several O365 data protection disconnects and explain how 3rd party backup solutions can address these gaps.
Posted: 09 Oct 2019 | Premiered: Oct 9, 2019

Druva Software

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva Software
WEBCAST: Join this webinar to hear a trio of experts as they walk through how you can leverage Druva and VMware Cloud on AWS to seamlessly move and protect apps without rework, simplify data center migration into AWS, achieve robust backup and DR for hybrid environments, and more.
Posted: 12 Sep 2019 | Premiered: Aug 8, 2019

Druva Software

Customers Save Time and Up to 50% in Backup Costs with Druva on AWS
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover the benefits of deploying Druva on AWS and gain the ability to improve data protection, streamline management, and effortlessly scale backups.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Druva Software

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO: Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019

Shape Security

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
VIDEO: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: 16 May 2019

RSA Conference

Learn How to Control Access to Sensitive Data in Your Data Lake
sponsored by Okera
VIDEO: In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.
Posted: 24 Jun 2019 | Premiered: 24 Jun 2019

Okera

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

Veeam and AWS for Backup and Recovery
sponsored by Veeam Software
WEBCAST: Join Veeam Technical Analyst Andrew Zhelezko and Marketing Manager Edward Watson in this webcast to learn key considerations for ensuring the portability of workloads to the cloud, executing successful workload recovery into AWS, and more.
Posted: 30 Apr 2019 | Premiered: Feb 28, 2019

Veeam Software

Tape as an Airgap Against Ransomware
sponsored by Fujifilm Recording Media USA, Inc.
WEBCAST: Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Fujifilm Recording Media USA, Inc.

Cloud Security: Don't Go Blind While Playing in the Cloud
sponsored by Ziften
WEBCAST: Clouds are an intense security target because of their concentration of information. Why would hackers target multiple different companies when they can go to the cloud data center and see the same target opportunity? In this webcast, listen as Dr. Al Hartmann and Michael Levin discuss 6 security tips for moving enterprise apps to the cloud.
Posted: 27 Mar 2019 | Premiered: Mar 27, 2019

Ziften
1 - 25 of 162 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement