IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed   
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.The concept of hard-drive  … 

Data Encryption definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Data Encryption Reports
1 - 25 of 214 Matches Previous Page  |  Next Page
DLP and CASB Aren't Enough: A Better Model for Data Security
sponsored by Vera
VIDEO: Protecting the information that matters the most to your organization, such as sensitive customer data, is one of the main priorities and concerns when using cloud platforms. Listen to this webcast to uncover how you can ensure security of your company's data.
Posted: 18 Jun 2018 | Premiered: 12 Jun 2018

Vera

Managed File Transfer
sponsored by HelpSystems
RESOURCE: Managed File Transfer (MFT) provides companies a safe and audited method for transferring information within and outside of their enterprise. Check out this resource for ways MFT can help your enterprise.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

HelpSystems

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Jumio

The Executive Guide to Demystifying Cybersecurity
sponsored by Radware
WHITE PAPER: Inside, find out what banks and cybersecurity have in common and learn several ways of protecting and monitoring valuable information.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

The 2018 Global Cloud Data Security Study
sponsored by Gemalto
RESEARCH CONTENT: According to a Ponemon Institute Study, 53% of respondents believe their organization does not have a proactive approach to managing compliance with privacy and data protection regulations in the cloud. Explore the report to gain insight into enterprises' cloud data security measures and how they plan to protect sensitive data within the cloud.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Crypto-Agility: Security Without Compromise
sponsored by Gemalto
WHITE PAPER: Cryptographic protocols and algorithms evolve over time to counter new security threats. This resource explores Gemalto's encryption strategy, which can help you gain certified high-assurance network security, maximum network and application performance, and more.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

Delphix

BitLocker Security Enhanced
sponsored by WinMagic
WHITE PAPER: Most enterprises don't operate on only one security platform, so why rely solely on one native encryption posture to manage your risks? Explore this solutions brief to see if the implementation of SecureDoc combined with your existent Microsoft BitLocker is right for your enterprise's security needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Acronis

The APAC Guide to Data Protection & GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

ComputerWeekly.com

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 01 May 2017 | Published: 02 May 2017

ComputerWeekly.com

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Cloud-based backup services are a safety net in tricky times
sponsored by SearchDataBackup.com
EBOOK: Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

SearchDataBackup.com

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Data Sovereignty Challenges
sponsored by VMware
WHITE PAPER: As countries adopt their own unique data sovereignty laws, its important companies remain cognizant of where their data is stored to avoid international ramifications. In this brief infographic, learn about the projected growth of cloud, international data flow and key steps countries have taken to instate compliance measures for data access.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

VMware
1 - 25 of 214 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement