IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1946 Matches Previous Page  |  Next Page
Driving in the Data Security Fast Lane: Secureworks Puts McLaren in Pole Position
sponsored by Dell SecureWorks
CASE STUDY: In motorsport, there are huge quantities of data being processed by engineers in the pit. Keeping this information secure and available when needed is essential. In this case study, learn how McLaren was able keep their data secure by deploying Securework's full cybersecurity platform across the organization to assess threats in real time.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

Third-Party Cyber-Risk for Financial Services: Blind Spots, Emerging Issues & Best Practices
sponsored by BitSight
RESEARCH CONTENT: Today's complex business world means that organizations need to work with third parties. While this is critical, the exchange of sensitive information creates a new set of security risks. In this research report, explore key findings from a survey aimed to assess how financial institutions are responding to third-party cyber-risk.
Posted: 22 May 2019 | Published: 30 Apr 2019

BitSight

Halton Borough Council Supports Vulnerable Citizens with Veeam Intelligent Data Management
sponsored by Veeam Software
CASE STUDY: The challenge of ensuring exponentially increasing volumes of data are properly backed up is one which many enterprises can appreciate. To discover how Halton Borough Council ultimately achieved reliable, GDPR-compliant backups without draining vital resources, access the study now.
Posted: 22 May 2019 | Published: 22 May 2019

Veeam Software

2018 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Verizon published its report on payment card security and compliance with the PCI DSS. Download the report now for a deep-dive into the specifics of what organizations find challenging about PCI DSS, the lessons learned from decades of dealing with compliance, and how to build a more sustainable security environment.
Posted: 22 May 2019 | Published: 22 May 2019

Verizon

Are You Ready for the Future of Disaster Recovery and Business Continuity Planning?
sponsored by Involta
WHITE PAPER: This white paper will help as you review your company's disaster recovery and business continuity plan (DR/BCP). Read on for 5 critical considerations as you revisit your DR plan, how to prepare for several different disaster scenarios, and more.
Posted: 22 May 2019 | Published: 31 Dec 2018

Involta

Protect Your Business from the Unexpected
sponsored by Involta
RESOURCE: To ensure you can recover quickly in the event of an outage, check out this infographic. It identifies the most common causes of downtime, explains how DRaaS offers one means of improving DR resiliency, and details 5 DRaaS benefits.
Posted: 22 May 2019 | Published: 31 Dec 2017

Involta

8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Combining Modern HCI with Complete Data Protection
sponsored by Commvault
WEBCAST: Guest speaker from Forrester Research Naveen Chhabra, Senior Director of Product Management at Cisco Vijay Venugopal, and Director of Product Management at Commvault Jonathan Howard discuss the challenges of establishing comprehensive data protection and DR in hyper-converged environments in this webcast.
Posted: 21 May 2019 | Premiered: May 21, 2019

Commvault

Is Your Cybersecurity Strategy In Good Shape?
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you tackle these evolving threats and secure your business with a proven 3-stage data protection process. View it now to get started and to ensure your cybersecurity strategy is in good shape.
Posted: 21 May 2019 | Published: 31 Dec 2018

Iron Mountain

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

TITUS Intelligent Protection
sponsored by TITUS
PRODUCT OVERVIEW: TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.
Posted: 17 May 2019 | Published: 17 May 2019

TITUS

Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

The State of the CASB Market
sponsored by Forcepoint
WEBCAST: With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

TITUS Military Classification Tool
sponsored by TITUS
DATA SHEET: In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018

TITUS

Security Challenges for State and Local Government IT Departments
sponsored by Dell EMC
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

Combining Modern HCI with Complete Data Protection
sponsored by Commvault Cisco Forrester
WEBCAST: Guest speaker from Forrester Research Naveen Chhabra, Senior Director of Product Management at Cisco Vijay Venugopal, and Director of Product Management at Commvault Jonathan Howard discuss the challenges of establishing comprehensive data protection and DR in hyper-converged environments in this webcast.
Posted: 14 May 2019 | Premiered: May 14, 2019

Commvault Cisco Forrester

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Drive Digital Transformation with a Unified Data Management Approach
sponsored by Softchoice
WHITE PAPER: Download this paper to discover a 360-degree approach for visualizing, protecting, accessing, and migrating all of your data—even across the multi-cloud. You'll view 6 key capabilities and learn how your organization can benefit from a similar approach.
Posted: 14 May 2019 | Published: 31 Dec 2018

Softchoice

Enterprise Data Protection: A Four-Step Plan
sponsored by Veritas
WHITE PAPER: What goes into an enterprise-wide data protection (DP) plan? More than you think. This interactive buyers' guide and checklist provides you with a four-step approach to ensuring all workloads—whether on-premises or in the cloud—are protected efficiently.
Posted: 13 May 2019 | Published: 13 May 2019

Veritas

Top 5 Critical Alerts You Need for IT Security
sponsored by ManageEngine
WHITE PAPER: Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.
Posted: 13 May 2019 | Published: 13 May 2019

ManageEngine

Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

Enterprise Data Protection Special Edition E-book
sponsored by Veritas
EBOOK: Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition, is an overview of the issues faced by data protection teams and how to solve these problems. Get your complimentary copy.
Posted: 13 May 2019 | Published: 13 May 2019

Veritas
1 - 25 of 1946 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement