IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2869 Matches Previous Page  |  Next Page
Angelo State University Simplifies Refresh Cycles With Druva inSync
sponsored by Druva Software
CASE STUDY: Find out this university was able to simplify its refresh process, maintain continuous data protection, and reduce data restore and backup times by 75%.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

Druva Software

How to Achieve Breakthrough BC/DR While Controlling Costs and Complexity
sponsored by Pure Storage
WHITE PAPER: This custom white paper outlines a new active/active stretched cluster technology with transparent failover that allows companies of all sizes to achieve the highest levels of business continuity. Designed to work with all-flash arrays, read on for the complete description of its features.
Posted: 19 Oct 2018 | Published: 31 Dec 2017

Pure Storage

Overview: Iron Cloud from Iron Mountain
sponsored by Iron Mountain
PRODUCT OVERVIEW: Iron Mountain is now foraying into the cloud space with their data management platform Iron Cloud. Just what exactly is Iron Cloud, and what does it offer in terms of backup, archiving, and data migration services? Read on to find out.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Iron Mountain

Solution Overview: Iron Cloud Critical Protection and Recovery
sponsored by Iron Mountain
PRODUCT OVERVIEW: This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Iron Mountain

Data Restoration Program
sponsored by Iron Mountain
PRODUCT OVERVIEW: This resource highlights a data restoration program that removes the operational headaches and costly management of tape backup systems from your plate. If you want to reduce the cost of tape operations, know for certain what data your tape backups are storing, and gain the ability to quickly retrieve data, read on.
Posted: 17 Oct 2018 | Published: 31 Dec 2016

Iron Mountain

Are You Ready for the Inevitable? Be Prepared for Ransomware
sponsored by Iron Mountain
RESOURCE: What options are at your disposal for protecting critical data in the event of a ransomware attack? This infographic discloses one such option, which can isolate your company's most valuable IP/mission-critical data sets from the network. Download here to distance your data from the threat of ransomware.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Iron Mountain

Discovering Modern Data Management
sponsored by Imanis Data
WHITE PAPER: It's not a stretch to say that data is the true lifeblood of an enterprise and organizations depend on it. In this white paper, discover the 4 pillars of data management as well as an introduction to Imanis Data, including core capabilities, security intelligence and more.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Imanis Data

CW ASEAN: Unlock flash opportunities
sponsored by ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com

Introducing ThreatConnect's Intel Report Cards
sponsored by ThreatConnect
PRODUCT OVERVIEW: Learn about the report card feature and metrics, and how you can use insights into how certain feeds are performing within your threat intelligence platform to make better decisions throughout your security lifecycle.
Posted: 11 Oct 2018 | Published: 03 May 2018

ThreatConnect

The Power and Responsibility of Customer Data and Analytics
sponsored by ThreatConnect
RESOURCE: Learn how ThreatConnect uses customer data and analytics can help your organization avoid future compromises in trust and enhance data security.
Posted: 11 Oct 2018 | Published: 12 Apr 2018

ThreatConnect

Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World
sponsored by Smarsh
WHITE PAPER: Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Smarsh

Bank Achieves $5 Million in Annual Savings Through Data Archiving and App Decommissioning
sponsored by Flatirons Digital Innovations
CASE STUDY: This year, BMO Harris Bank earmarked over 100 apps for retirement. Read on to learn the path by which BMO extracted their data from legacy applications that needed decommissioning and archived it to a central repository where it could be retained and accessed in a fully compliant manner.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Flatirons Digital Innovations

Case Study: Data Archiving During Mainframe Systems Decommissioning
sponsored by Flatirons Digital Innovations
CASE STUDY: One global steel firm found itself with two of their apps on decades-old IBM mainframes that had no archiving capabilities. Delve into this detailed study to view the tool that enabled this firm to securely archive data from their two aging systems and decommission those outdated apps.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Flatirons Digital Innovations

Enabling Universal SAP Data Availability
sponsored by Attunity
WHITE PAPER: Download this white paper to learn about leading data replication software, Attunity, and what it can do when integrated with your SAP environment.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Attunity

Implementing General Data Protection Regulation in SAP Environments
sponsored by Attunity
WHITE PAPER: While the GDPR regulations are broad and thorough, they are open to interpretation and lack specificity regarding implementation. Download this white paper to learn how to implement the compliance policies in your SAP environment, today.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Attunity

Protecting Sensitive Payment Data on AWS
sponsored by Amazon Web Services
VIDEO: While developing an online concessions payment program for local students, Snapper, an account-based solutions provider, realized its current security capabilities could use a tune-up to avoid putting student information at risk. Find out how Snapper strengthened its payment security without making concessions on customer security.
Posted: 09 Oct 2018 | Premiered: 28 Sep 2018

Amazon Web Services

Pre and Post-GDPR Era
sponsored by Fortinet, Inc.
RESOURCE: What does your organization still need to be aware of in a GDPR governed digital world? Download this resource for more information.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Fortinet, Inc.

Building a Threat Intelligence Program
sponsored by ThreatConnect
RESEARCH CONTENT: Cybersecurity decision makers overwhelmingly agree that their organizations should be investing more in their threat intelligence programs. In this report, uncover research findings from 351 cybersecurity decision makers in the U.S. on best practices and impact of building a threat intelligence program.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

ThreatConnect

Governed Data Lakes for Business Insights
sponsored by IBM
WHITE PAPER: Secure data sharing is crucial when multiple teams require access to enterprise data, and to help manage this data organizations can turn to a governed data lake. In this white paper discover the architecture of a governed data lake, 4 types of data consumers, and more.
Posted: 05 Oct 2018 | Published: 31 Aug 2018

IBM

Data Migration Between Backup Software Solutions
sponsored by Commvault
WHITE PAPER: This paper presents an alternative approach to migration between backup software solutions, one which includes a portfolio of service offerings for every migration stage and can be tailored to your data. Reading on will help you understand all your migration options.
Posted: 05 Oct 2018 | Published: 31 Dec 2017

Commvault

Quantifying the Business Value of Commvault Software: Worldwide Customer Analysis
sponsored by Commvault
WHITE PAPER: To investigate the market's leading backup solutions, IDC conducted an independent survey of Commvault's worldwide customer base to examine the business value of their backup software and solutions. Access IDC's high-level and tactical takeaways in this PDF.
Posted: 05 Oct 2018 | Published: 31 Jul 2018

Commvault

How Safe Are Your Backups?
sponsored by Solarwinds MSP
RESOURCE: Techvangelism founder Nick Cavalancia provides you with three steps designed to prevent inappropriate access or manipulation of your backups in this resource. Access those steps, which will help you reduce the likelihood that your backups will fall victim to an attack like ransomware, here.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Solarwinds MSP

Closing the Communication Gap Around Security & Digital Transformation
sponsored by Rackspace
EBOOK: Despite cybersecurity being front of mind for board members, many admit they do not have a strategy to tackle the 'how, what, where and why' questions related to data protection. Read on for an in-depth explanation of why the board and ITDMs need to close the communication gap around security and digital transformation, today.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Rackspace

Commvault HyperScale Validated Reference Design Specification
sponsored by Commvault
RESOURCE: This document covers the validated design components of the Commvault HyperScale architecture, a unified data protection platform that delivers cloud-like services on-premises. The platform's configurations were tested with HPE ProLiant DL380 Gen 10 infrastructure, and core components and features can be found by reading on.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

Commvault

Archiving vs. Backup—What's the Difference?
sponsored by Solarwinds MSP
RESOURCE: In this resource, Brien Posey breaks down the differences between archiving and backup, explains why those difference matter, and details the importance of having an archiving system in place for your organization. Access his insight here.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

Solarwinds MSP
1 - 25 of 2869 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement