IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Multimedia (View All Report Types)
26 - 50 of 233 Matches Previous Page  |  Next Page
Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

What is Multi-factor Authentication?
sponsored by HID Global
VIDEO: Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.
Posted: 19 Oct 2017 | Premiered: 19 Oct 2017

HID Global

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017

Splunk

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

Recovering From a "WannaCry" Infection Without Paying
sponsored by Actifio
PRODUCT DEMO: Did you get hit with a WannaCry ransomware attack? In this, demo, learn how to easily combat a WannaCry attack by using Actifio to restore your file server to a clean point-in-time and recover your files, without paying any ransom.
Posted: 12 Jul 2017 | Premiered: 12 Jul 2017

Actifio

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix

Master the Internet of Things
sponsored by VMware Pulse
WEBCAST: The Internet of Things (IoT) is ready to change the world, but it has a list of challenges to tackle. Watch this video to learn how you can use a single management platform that enables you to make the most of your IoT investment and overcome those challenges.
Posted: 30 May 2017 | Premiered: Aug 30, 2016

VMware Pulse

What the new EU data protection rules mean for IT marketers
sponsored by ComputerWeekly.com
WEBCAST: The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.
Posted: 30 May 2017 | Premiered: May 30, 2017

ComputerWeekly.com

The Essential Guide to Storage for DevOps
sponsored by Tintri
WEBCAST: When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.
Posted: 27 Mar 2017 | Premiered: Dec 30, 2016

Tintri

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
PODCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 18 May 2016 | Premiered: Apr 18, 2016

Equinix

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
PODCAST: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how cloud backup and archiving can improve both data reliability and recovery. Discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 17 May 2016 | Premiered: Apr 18, 2016

Equinix

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
PODCAST: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how hybrid cloud strategies can provide enterprises with infinite storage capacity that is secure and reliable. Access now to learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix
26 - 50 of 233 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement