IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security White Papers (View All Report Types)
1 - 25 of 817 Matches Previous Page  |  Next Page
Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

5 Best Practices in Cloud Security for Aviation
sponsored by ShieldX
WHITE PAPER: It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

ShieldX

Top Five Reasons for Office 365 Backup
sponsored by Druva Software
WHITE PAPER: Download the following white paper to discover 5 critical reasons to back up Office 365 and the benefits of using a third-party data protection solution to do so.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Druva Software

Raising the Bar for Reliability
sponsored by Datto, Inc.
WHITE PAPER: Download this white paper to raise the bar for reliability and to learn how to establish near-bulletproof business continuity for yourself and for your customers.
Posted: 14 Oct 2019 | Published: 31 Dec 2018

Datto, Inc.

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

A Risk-Adaptive Approach to Dynamic Data Protection
sponsored by Forcepoint
WHITE PAPER: By using Dynamic Data Protection, organizations can automate policy enforcement to dynamically respond to changes in risk within an organization. Read on to learn more about the end-to-end, human-centric security architecture.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Forcepoint

Why the Next Phase of Digital Transformation Begins with Data Infrastructure
sponsored by Pure Storage
WHITE PAPER: Read this white paper to dig into the top 5 reasons enterprises are seeking out new storage models to streamline their digital transformation initiatives and to learn how to establish a flexible, data-centric architecture in your organization.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Pure Storage

Storage Data Migration Simplified
sponsored by Cirrus Data Solutions
WHITE PAPER: Storage data migration has many moving parts and can quickly become an overwhelming task. Read the following white paper to examine an approach that can simplify, and reduce the risks associated with, data migration.
Posted: 07 Oct 2019 | Published: 31 Oct 2017

Cirrus Data Solutions

Digital Transformation Drives the Need for Higher Data and Storage Availability
sponsored by IBM
WHITE PAPER: The following IDC paper digs into the dynamics of how digital transformation and demands for higher data availability are influencing storage decisions, as well as the methods organizations are employing to meet these expectations.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

IBM

Europe: High-stakes CX
sponsored by Verizon
WHITE PAPER: How can your organization break through Europe's unique set of CX challenges? Inside, discover the ways brands can overcome the que set of challenges Europe provides to enjoy significant CX success in the region, and learn why Europeans are so distrusting of brands using their data.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Verizon

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Employees Quit Data Leaves
sponsored by Code42
WHITE PAPER: Not all employees leaving your business steal data, but according to a recent study, of the 24 million quitters last year that took data from their employers, 90% went unnoticed. Download this data loss protection sheet which highlights a realistic quitting story with a data thief, and learn how management and monitoring can save your data.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Code42

3 Ways to Protect Data From Insider Threats
sponsored by Code42
WHITE PAPER: Rising rates of employee turnover creates more opportunities and gaps for outgoing employees to steal, leak, or compromise company data and files. Download this insider data loss threat protection sheet to learn about the signs of each major insider data threat, and have the right plan in place to keep data secure.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Code42

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

The State of Data Protection and Cloud
sponsored by Veritas
WHITE PAPER: As the enterprise data environment becomes more complex, so does the challenge of ensuring cost-effective, efficient data protection. In a recent survey, 250 IT executives discussed how they were providing comprehensive backup and recovery across their virtual, physical and multi-cloud environments. Download this white paper to learn more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Veritas

Future of Backup: From Periodic to Continuous
sponsored by Zerto
WHITE PAPER: Download this white paper to examine the benefits of continuous backup as compared to periodic backup, and to view an IT Resilience platform that can help your organization defeat the shortcomings of traditional tools by utilizing the Elastic Journal.
Posted: 16 Sep 2019 | Published: 31 Mar 2019

Zerto

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

A 4-Tier Approach to Modern Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper presents an alternative, 4-tier data protection approach that streamlines storage and security in multi-tier storage environments. Read on to view this solution and to see how it may ultimately benefit your company.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Veeam Software

Configuration Guide for NetApp and Veeam Backup & Replication 9.5
sponsored by Veeam Software
WHITE PAPER: Customizing your deployment of Veeam Backup & Replication 9.5 and NetApp ONTAP to suit your environment can result in better overall performance and lower overhead. Download this comprehensive, 43-page configuration guide now to get started.
Posted: 10 Sep 2019 | Published: 31 Dec 2017

Veeam Software

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

The True Cost of Cold Data
sponsored by Igneous
WHITE PAPER: Download this white paper to dig into the true costs of keeping cold data on primary storage as well as several alternatives, such as a solution that can quickly and easily identify datasets that haven't been touched so you can archive them accordingly.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Igneous

Succeeding at the Intersection of Security and Privacy
sponsored by Virtru
WHITE PAPER: This white paper covers the intersection of the security and privacy industries, incorporating how privacy laws, cybersecurity challenges and increased attention have affected the crossover of these spaces. Read on to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru
1 - 25 of 817 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement