IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2069 Matches Previous Page  |  Next Page
Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security. Read on to learn more.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

The CipherTrust Cloud Key Manager for Multicloud Environments
sponsored by Thales
PRODUCT OVERVIEW: Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.
Posted: 25 Mar 2020 | Published: 28 Feb 2018

Thales

The Changing Face of Data Security 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales

Meeting Compliance and Data Privacy Requirements
sponsored by Thales
EBOOK: Wherever you operate, Thales can help you improve your data security posture and become fit for compliance. View this e-book to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales

2019 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Digital transformation is fundamentally changing business operations in today's enterprises – and that's putting sensitive data at risk. Find out how moving to the cloud or multi-cloud environments as part of this digital transformation journey makes protecting sensitive data increasingly complex.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales

Protecting a Nation in the Cloud
sponsored by Trustwave
CASE STUDY: In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Upgrading Existing Security Systems to Agile Quantum-Safe
sponsored by Thales
PRODUCT OVERVIEW: Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Thales

The 2020 Study on Staffing the IT Security Function in the Age of Automation
sponsored by DomainTools
WHITE PAPER: Automation is growing in popularity amongst IT security teams – offloading certain tasks in order to reduce workload and enhance productivity. In this report, discover the results of a Ponemon Institute study into the relationship between IT security staffing and automation.
Posted: 24 Mar 2020 | Published: 29 Feb 2020

DomainTools

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Thales
WHITE PAPER: Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

CipherTrust Cloud Key Manager
sponsored by Thales
DATA SHEET: While it’s been common practice for the cloud provider to hold the key for encryption capabilities, industry best practices mandate that the keys be held by neither the cloud provider nor the end user. This data sheet takes a closer look at the key features and capabilities of the CipherTrust Cloud Key manager. Read on to get started.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations continue to migrate towards cloud services, its critical to ensure they’re taking the proper steps to establish adequate security. This white paper highlights a proven database security methodology and lists 7 steps organizations can take to achieve cost-effective cloud security. Read on to learn more.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Trustwave

Finds Cost- and Time-Savings with IdentityNow
sponsored by SailPoint Technologies
CASE STUDY: Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

SailPoint Technologies

A Silver Lining for Security: Cybercrime is on the Rise, but the Cloud Offers Protection
sponsored by HP
WHITE PAPER: Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.
Posted: 18 Mar 2020 | Published: 31 Dec 2019

HP

Global Security Compliance and Its Technological Implications
sponsored by ROOTS Asia Pacific (Singapore) Pte Ltd - Lenovo
WHITE PAPER: The rise of sophisticated and costly cyberattacks have led to the inception of various security regulations with the intention of creating holistic, standardized approaches to cybersecurity. In this white paper, learn more about the regional security regulations and discover Lenovo’s global approach to compliance.
Posted: 18 Mar 2020 | Published: 18 Mar 2020


Threat Detection and Response in Cloud Environments
sponsored by Vectra Networks
WHITE PAPER: As organizations continue to integrate cloud technologies into their environments, their approach to security should also reflect the new risks they could face. In this white paper, explore threat detection and response in the cloud era by looking at top threats, the anatomy of cloud attacks and how to mitigate threats. Get started now.
Posted: 18 Mar 2020 | Published: 06 Jun 2019

Vectra Networks

Data Governance, Risk and Digital Transformation
sponsored by Optiv
RESOURCE: With 87% of companies relying on personal devices, organizations prioritizing digital transformation require board room leaders to rethink the way they monitor, asses and mitigate risk. Read on to discover the 8 pillars of effective data governance, and how they can help to achieve effective risk management.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Optiv

Risk Management and Transformation: Privacy and Governance
sponsored by Optiv
DATA SHEET: According to Forrester State of Risk Management, business decision makers rated information security and data privacy as having the highest potential to impact their organization. In this brief, learn how Optiv’s Privacy and Governance services can help to manage risk at your organizations with strategies aligned to your unique business objectives.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Optiv

Security at the Speed of Business
sponsored by Optiv
WHITE PAPER: With an economy driven by information, data is every organization’s most important asset. But it is also a source of considerable risk. In this white paper, explore a blueprint for establishing identity and data governance programs to proactively manage risk in today’s more complex, dynamic environment.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

Optiv

The Journey to Digital Trust
sponsored by CyberArk PwC
ANALYST REPORT: In a recent PwC Digital Trust Insight survey, 3,000 business leaders worldwide were asked about the readiness of their organizations to address digital business, risk management and compliance challenges. Download this report to explore 10 major opportunities for improvement around people, processes and technology.
Posted: 12 Mar 2020 | Published: 31 Oct 2018

CyberArk PwC

4 Keys to Automating Threat Detection, Threat Hunting and Response
sponsored by Fidelis
WHITE PAPER: When it comes to detecting and responding to threats and preventing data loss, speed and accuracy are everything as the machine initially compromised is almost never the one the intruder needs to accomplish his or her objective. In this white paper, explore 4 keys to maturing your advanced threat defense.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

Fidelis

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies
1 - 25 of 2069 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info