IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Multimedia (View All Report Types)
1 - 25 of 162 Matches Previous Page  |  Next Page
Cloud Disaster Recovery: A Survival Guide by the University of Canberra
sponsored by Commvault
WEBCAST: By choosing a DR backup solution that automatically uploaded data daily and secures it for long-term retention, The University of Canberra could be sure that their data was safe in the event of a disaster. Watch this webcast to learn more about the solution that Canberra chose and the 5 transformational benefits it created.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Commvault

Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

Ransomware - Protect Your Data
sponsored by Commvault
WEBCAST: One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.
Posted: 17 Jan 2020 | Premiered: Jan 17, 2020

Commvault

Introducing Frictionless Content Security
sponsored by Box
VIDEO: The paradox of security is the more you lock down content, the harder you make it for users to get their work done. In this video, learn how Box Shield can help reduce the risk of accidental data leakage and protect your business from insider and external threats.
Posted: 23 Dec 2019 | Premiered: 23 Dec 2019

Box

Protect Your Cloud Journey with Druva and Amazon Web Services (AWS)
sponsored by Druva
WEBCAST: Druva, powered by AWS, utilizes cloud and local data sources to provide data protection, governance, and intelligence, while eliminating the need for silos of storage hardware. Access this webcast to extract the 6 foundational benefits of Druva’s cloud-native SaaS solution and see how your company can benefit.
Posted: 18 Dec 2019 | Premiered: Dec 18, 2019

Druva

Achieving Compliance and Reducing Risk
sponsored by Comforte AG
VIDEO: Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.
Posted: 13 Dec 2019 | Premiered: 13 Dec 2019

Comforte AG

Protecting Public Sector Organizations Against Ransomware and Other Cyber Threats
sponsored by Hewlett Packard Enterprise
WEBCAST: In order to protect your company from cyber attackers, you need proper strategies in place that will protect and recover your data, harden systems and environments, and review security policies more than once a year. Watch this webcast from TechTarget, sponsored by HPE, to learn how your organization can defend itself against ransomware attacks.
Posted: 13 Dec 2019 | Premiered: Jan 2, 2020

Hewlett Packard Enterprise

Modernize Your Data Center with Veeam Availability for Nutanix AHV
sponsored by Veeam Software
VIDEO: Tune into this video to get a first-hand look at the features and functionality of a backup tool that gives admins the ability to perform snapshot jobs, execute restores and recoveries, see job errors, and more for apps and data running on Nutanix AHV: Veeam Availability.
Posted: 18 Nov 2019 | Premiered: 31 Jul 2019

Veeam Software

Veeam and AWS Avengers: Guardians of Recovery
sponsored by Veeam Software
WEBCAST: Join Veeam Technical Analyst Andrew Zhelezko and Marketing Manager Edward Watson in this webcast to learn key considerations for ensuring the portability of workloads to the cloud, executing successful workload recovery into AWS, and more.
Posted: 18 Nov 2019 | Premiered: Sep 30, 2019

Veeam Software

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Modern Data Protection: Why Backup Alone Is Not Enough
sponsored by Comport Consulting
WEBCAST: This white paper introduces one method of unifying data protection across your on-prem and offsite environments: Disaster Recovery as a Service (DRaaS). Read on to view 10 tangible benefits of DRaaS and for guidance on properly protecting all your workloads.
Posted: 12 Nov 2019 | Premiered: Dec 31, 2017

Comport Consulting

Cyber Hygiene: Doing the Basics with Microsoft
sponsored by Snow Software
WEBCAST: Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

Snow Software

Best Practices for Physical Server and Endpoint Backup
sponsored by Veeam Software
WEBCAST: In this webcast, Veeam Senior Director of Product Strategy Rick Vanover shares best practices for physical server and endpoint backup, as well as showcases how the Veeam Agents for Windows and Linux can help organizations keep physical data available.
Posted: 04 Nov 2019 | Premiered: Jun 26, 2019

Veeam Software

The Business Value of High Availability Storage Environments from HPE and Veeam
sponsored by Veeam Software
WEBCAST: Not every backup system on the market—though they may tout as such—cannot deliver the desired data availability, streamline operations in heterogenous environments, and reduce costs and the risk of data loss. Tune into this video to discover a solution from HPE and Veeam that can deliver on these promises.
Posted: 01 Nov 2019 | Premiered: Feb 1, 2018

Veeam Software

Improving Cybersecurity with ITAM: An Equifax Case Study
sponsored by Snow Software
WEBCAST: Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Snow Software

7 Expert Tips for Multi-cloud Data Management
sponsored by Veeam Software
WEBCAST: Tune into this webcast to join several experts from Veeam, Cisco, and LinxDataCenter for a discussion on the challenges—and opportunities—of working in the multi-cloud. Topics discussed include how to protect your multi-cloud data and who is responsible, multi-cloud management tips, and more.
Posted: 31 Oct 2019 | Premiered: May 31, 2019

Veeam Software

Protect Your Workforce Productivity
sponsored by Druva
WEBCAST: Watch this webinar to hear 3 industry experts discuss several best practices for protecting Office 365, 4 challenges to overcome, and data recovery options at your disposal—so you can ensure your environment is properly protected.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Druva

The Importance of Third-Party Backup for Office 365
sponsored by Druva
WEBCAST: Tune into the following webcast as Michael D. Osterman, President of Osterman Research, and W. Curtis Preston, Chief Technologist at Druva, break down several O365 data protection disconnects and explain how 3rd party backup solutions can address these gaps.
Posted: 09 Oct 2019 | Premiered: Oct 9, 2019

Druva

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO: Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019

Shape Security

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Learn How to Control Access to Sensitive Data in Your Data Lake
sponsored by Okera
VIDEO: In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.
Posted: 24 Jun 2019 | Premiered: 24 Jun 2019

Okera
1 - 25 of 162 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info