IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.The concept of hard-drive  … 

Data Encryption definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Data Encryption Reports
1 - 25 of 212 Matches Previous Page  |  Next Page
Cloud-based backup services are a safety net in tricky times
sponsored by SearchDataBackup.com
EBOOK: Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

SearchDataBackup.com

GDPR Requirements for Data Masking
sponsored by Delphix
WHITE PAPER: This white paper examines GDPR requirements and why the EU GDPR strongly incentivizes the pseudonymisation of all personal data.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

Delphix

Introducing the Delphix Dynamic Data Platform
sponsored by Delphix
VIDEO: IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.
Posted: 21 Nov 2017 | Premiered: 15 Nov 2017

Delphix

Five Reasons to Reevaluate Your Current Backup Approach
sponsored by Acronis
WHITE PAPER: By downloading this resource, you'll discover 5 reasons you may need to reevaluate your current backup approach. Read on to see a platform that enables instant recovery from ransomware, supports all major hypervisors, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Acronis

The APAC Guide to Data Protection & GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

ComputerWeekly.com

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Making Data Encryption and Rekeying Easier
sponsored by HyTrust
WHITE PAPER: Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Computer Weekly – 2 May 2017: How to deal with data under GDPR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.
Posted: 01 May 2017 | Published: 02 May 2017

ComputerWeekly.com

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Top 10 Reasons Quorum Beats the Competition
sponsored by QuorumLabs Inc.
PRODUCT REVIEW: Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

QuorumLabs Inc.

IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Managing Android devices in the enterprise
sponsored by ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Data Sovereignty Challenges
sponsored by VMware
WHITE PAPER: As countries adopt their own unique data sovereignty laws, its important companies remain cognizant of where their data is stored to avoid international ramifications. In this brief infographic, learn about the projected growth of cloud, international data flow and key steps countries have taken to instate compliance measures for data access.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

VMware

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by EOH IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

EOH IBM
1 - 25 of 212 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement