IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2776 Matches Previous Page  |  Next Page
What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

How to Build an Effective API Security Strategy
sponsored by Imperva
ANALYST REPORT: By 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications. In this Gartner report, explore the importance of key API stakeholders and the 3-step approach to continuous API security.
Posted: 15 Aug 2018 | Published: 08 Dec 2017

Imperva

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

Holistic Data Protection Resource Center
sponsored by Commvault
RESOURCE CENTER: This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Commvault

Holistic Data Protection Custom Web Site
sponsored by Commvault
RESOURCE CENTER: This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Commvault

Holistic Data Protection Center
sponsored by Commvault
RESOURCE CENTER: This custom website will serve as your go-to space for establishing holistic data protection in your enterprise—containing a swath of essential resources, including 4 instructive videos and 3 compliance-minded guides. Read on to view the 8 resources the site contains.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Commvault

How CIOs are Achieving Compliance Using Encryption Management in the New Regulatory Era
sponsored by WinMagic
RESOURCE: Download this resource for a look at a CXO briefing with a 'how to' guide for a simplified approach to compliance with encryption management.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

Making BitLocker Simple, Smart and Secure for You
sponsored by WinMagic
WHITE PAPER: Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

Security Think Tank: Data Protection vs. Data Loss Prevention
sponsored by Docauthority
EGUIDE: Why is it important to know where data flows, with whom it's shared and where it lives at rest? Discover why your organization could benefit from focusing on data protection, without relying on data loss prevention alone.
Posted: 13 Aug 2018 | Published: 30 Jun 2018

Docauthority

Leading Legal Firm Implements the Fidelis Platform to Protect Clients From Advanced Attacks
sponsored by Fidelis
CASE STUDY: Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fidelis

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
ANALYST REPORT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create chaos for the cybersecurity team and IT organizations in general. Uncover survey findings from 300 CISOs and CSOs, and more.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Fortinet, Inc.

Solving the Cybersecurity Skills Shortage
sponsored by Arctic Wolf
WEBCAST: 22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
Posted: 10 Aug 2018 | Premiered: Aug 10, 2018

Arctic Wolf

Digital Forensics And Incident Response Service Providers
sponsored by BCM One - Verizon
ANALYST REPORT: This Forrester report compares 14 of the most significant digital forensics incident response service providers and helps security and risk professionals make the right choice.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

BCM One - Verizon

Extreme Protection That Eliminates Data Loss for All of Your Oracle Databases
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Get an in-depth look at the key advantages and organizational benefits of Oracle's Zero Data Loss Recovery Appliance to avoid loss of sensitive data, today.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Oracle Corporation UK Ltd

Comprehensive E-book for Database Protection
sponsored by Oracle Corporation UK Ltd
EBOOK: The following e-book illustrates the intricacies associated with database backup and recovery, containing 4 chapters on architecting the optimal recovery solution, how to protect Oracle Databases specifically, and more. Click to download your copy.
Posted: 09 Aug 2018 | Published: 31 Dec 2017

Oracle Corporation UK Ltd

The Financial and Security Impact of Imperva SecureSphere
sponsored by Imperva
RESEARCH CONTENT: In this Total Economic Impact report, discover Forrester Research's findings about the Impeva SecureSphere, a unified security platform designed to protect apps and data from potential hackers.
Posted: 09 Aug 2018 | Published: 31 Jan 2018

Imperva

2018 Data Breach Investigations Report
sponsored by BCM One - Verizon
RESEARCH CONTENT: 78% of breaches feature either hacking or malware, according to Verizon's 2018 report that analyzed over 2,000 data breaches and 53,000 incidents. Download this full report for more information on changing trends among hacking vs. malware attacks.
Posted: 09 Aug 2018 | Published: 30 Apr 2018

BCM One - Verizon

SOC-as-a-Service in Action
sponsored by Arctic Wolf
CASE STUDY: As a global provider of technical support and help desk services, Trusource Labs' database contained personally identifiable information for tens of thousands of individuals. Simply put, Trusource could not risk being hacked. Explore how Trusource benefitted by turning to a security operations center (SOC)-as-a-service.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Arctic Wolf

Protecting Your Digital Enterprise
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: An area of concern for security is the care given to data recoverability. Purpose-built storage and strategies can help resolve data recoverability woes. Download this white paper to discover 5 enterprise security strategies for companies exposed to multiple business risks.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Oracle Corporation UK Ltd

Pennsylvania Housing Finance Agency Replaces MSSP with AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Find out how the IT staff at the Pennsylvania Housing Finance Agency (PHFA) realized they needed to do more to address today's threat landscape, and why they selected a SOC-as-a-service to meet their security needs. Continue reading to uncover the challenges PFHA faced that led them to a new first line of defense.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Arctic Wolf

GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

How to Reduce Your Organization's Digital Attack Surface & Cyber Risk
sponsored by IntSights
ANALYST REPORT: Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.
Posted: 07 Aug 2018 | Published: 30 Jun 2018

IntSights

3 Customer Profiles for Modern Data Management
sponsored by Imanis Data
CASE STUDY: As a result of a single developer error, a Fortune 10 company lost 400TB in their multi-petabyte Hadoop environment. Discover 3 customer stories and see how a data management platform helped save money and manage data.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

Imanis Data

Hyper-converged Secondary Storage: More Than Just a Trend
sponsored by Cohesity
EGUIDE: This guide delves into Cohesity's hyper-converged secondary storage platform, and explains why this new category of backup offerings is more than just a trend. Read on for the exclusive details, including an article illustrating how Cohesity's scale-out system replaced legacy EMC at Piedmont HealthCare in North Carolina.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Cohesity
1 - 25 of 2776 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement