IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2003 Matches Previous Page  |  Next Page
Veeam Backup for Microsoft Office 365 Best Practices
sponsored by Veeam Software
WEBCAST: Watch this webcast to gain an in-depth technical look into the best practices for operating Veeam Backup for Microsoft Office 365 and discover its 3 key capabilities.
Posted: 27 Oct 2020 | Premiered: Apr 22, 2020

Veeam Software

Creating a Multi-Layered Secured Postgres Database
sponsored by EnterpriseDB
WEBCAST: Ensuring your database security is up to par is a multifaceted challenge—you need to prevent unauthorized access and data corruption without restricting data access for your own employees. Watch this webinar to learn how industry experts create their own, open-source multi-layered Postgres database security.
Posted: 26 Oct 2020 | Premiered: Oct 26, 2020

EnterpriseDB

The Trusted Data Center and Server Infrastructure: Mid-Market Organizations
sponsored by Dell Technologies Partner Program
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies Partner Program

Top 10 Reasons for Migrating to CipherTrust Manager for KeySecure Customers
sponsored by Thales
WHITE PAPER: For years, the KeySecure platform has equipped organizations with key management and data protection capabilities across their organizations. The following white paper highlights 10 reasons why KeySecure users should switch over to Thales’s next-gen CipherTrust manager – read on to learn more.
Posted: 26 Oct 2020 | Published: 30 Jun 2020

Thales

CipherTrust Data Security Platform
sponsored by Thales
DATA SHEET: Security pros tasked with ensuring data protection are facing challenges on 3 fronts: looming cyberthreats, growing compliance requirements, and expanding environments. Read this data sheet for a closer look at the key features and capabilities of Thales’ CipherTrust Data Security Platform – which looks to alleviate these pain points.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Thales

Protecting and Securing Your Critical Data with Acronis Cyber Backup
sponsored by Acronis
WHITE PAPER: Access this white paper to explore the challenges involved in protecting and securing private business data and see how Acronis Cyber Backup meets these challenges while addressing all 5 vectors of cyber protection.
Posted: 26 Oct 2020 | Published: 19 Oct 2020

Acronis

Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.
Posted: 26 Oct 2020 | Published: 27 Oct 2020

ComputerWeekly.com

Data Protection is No Longer Optional: Why It’s a Requirement and How to Protect Your Business
sponsored by iland Internet Solutions Inc.
WEBCAST: Save your seat at this exclusive webinar—airing December 10, 2020 at 8am PT /10am CT /11am ET—to discover how you can take advantage of Veeam and iland for multi-layered protection & recovery, air-gapped cloud backups with anti-ransomware features, Office 365 security, and more.
Posted: 26 Oct 2020 | Premiered: Oct 26, 2020

iland Internet Solutions Inc.

The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales

The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

4 Ways Commvault Activate Improves Your Ability to Know, Manage, and Use Your Data
sponsored by Commvault
WHITE PAPER: Check out this white paper to learn 4 ways Commvault Activate can improve the way you know, manage, and use your data for security and governance purposes.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Commvault

The Reality of Ransomware – Is Your Data Recovery Ready?
sponsored by Commvault
DATA SHEET: Access this data sheet to view a 5-step plan to protect against ransomware and discover 7 distinguishing features of Commvault ransomware recovery.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Commvault

The Complete Guide for Preventing Costly Data Leaks for UK Local Governments
sponsored by Zivver
EGUIDE: For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Zivver

Securing Public Clouds: Understand the Cloud Shared Responsibility Model
sponsored by Radware
WHITE PAPER: As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Radware

At the Edge of Change
sponsored by Aruba Networks
RESOURCE: As the volume of network data explodes it must be processed, stored and analyzed near its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Aruba Networks

RAT Protection for Banking Customers That Works
sponsored by Buguroo
WHITE PAPER: Check out this white paper to learn about bugFraud from Bugaroo, a next-gen fraud prevention solution that identifies user’s behavioral and cognitive analytics to uniquely profile users in order to prevent online banking fraud through remote access trojan (RAT) attacks.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

Buguroo

Decade of the Rats
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

See and Defend Cloud Workloads with CrowdStrike and AWS
sponsored by AWS & CrowdStrike
VIDEO: Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.
Posted: 14 Oct 2020 | Premiered: 14 Oct 2020

AWS & CrowdStrike

Data Storage for Every Data Tier
sponsored by Iron Mountain
DATA SHEET: Access this data sheet to learn how Iron Mountain’s Data Management Service Portfolio lets you do things like easily move inactive cloud data to tape, decrease your storage costs and ensure long-term archival data compliance.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Iron Mountain

Veeam Availability Suite v10: Backup and Recovery Capabilities You Didn’t Know About
sponsored by Veeam Software
WEBCAST: Access this webcast to learn the 5 most important capabilities to consider when protecting your assets, no matter where they are, how to move backup copies off site in a safe and secure way, and much more.
Posted: 13 Oct 2020 | Premiered: Apr 1, 2020

Veeam Software

Aruba Clearpass Enables Secure and Robust Connectivity for Thousands Of Users In A Multi-Vendor Environment
sponsored by TechData
CASE STUDY: Since UST Global’s operations are spread across the globe, their associates always need secure connectivity. This means that rather than having a stable and flexible wireless network, they also had to ensure the highest level of data security. Download this case study to learn how UST Global was able to achieve this with the help of Aruba.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

TechData

Benefits of Migrating from Web Access Management (WAM)
sponsored by Okta
PRODUCT OVERVIEW: For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Okta

Choosing the Best Mobility Management Solution
sponsored by BlackBerry
WHITE PAPER: Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

BlackBerry
1 - 25 of 2003 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info