IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1966 Matches Previous Page  |  Next Page
The Perimeter is Dead. Long Live the Perimeter
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Cloud Security: Are You Ready?
sponsored by Symantec
ANALYST REPORT: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 21 Aug 2019 | Published: 30 Jun 2018

Symantec

Office 365 Business Case Builder
sponsored by Symantec
PRODUCT OVERVIEW: Office 365 is a broad and diverse platform that can present a complex security risk. In this resource, discover a 6-point business case builder to demonstrate how Symantec CloudSOC and Email Security.cloud can help provide protection for not just Office 365 but your wider cloud environment.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Don't Let Unexpected Storage Dependencies Put Your Business Continuity Plans at Risk!
sponsored by DataCore Software Corporation
RESOURCE: Despite assumptions to the contrary, you don't have to waste time and money reinventing your BC/DR plan every time your storage infrastructure changes. Download this infographic for more information on how to preserve proven business continuity practices even as your storage infrastructure evolves.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

DataCore Software Corporation

The Ultimate User Experience Guide to Driving Business Growth & Security
sponsored by Evident
WHITE PAPER: In this guide book, learn why exceptional user experience ensures you'll never have to choose between growth and security, and read practical user experience tips and best practices to help you know your customer with less friction and risk.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Evident

Data Security for the Way People Work
sponsored by Dell EMC and Microsoft
WHITE PAPER: Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Dell EMC and Microsoft

Identity Governance: The Great Enabler
sponsored by SailPoint Technologies
ANALYST REPORT: To understand how leading organizations are governing the digital identities of their employees and enhancing security in an age of rapid digital transformation, Forbes insights in association with SailPoint surveyed 200 senior technology executives at mid-market corporations. Download this report to explore highlights.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

SailPoint Technologies

Prepare for When Disaster Strikes
sponsored by Teradici
RESOURCE: This blog post covers 3 common disasters and how to combat them; read it here to ensure you can properly protect your organization if and when disaster strikes.
Posted: 20 Aug 2019 | Published: 31 Mar 2019

Teradici

Taking Steps to Prevent Your BC/DR Plans from Being Derailed
sponsored by DataCore Software Corporation
WHITE PAPER: The following white paper digs into how storage array replacement, mergers and acquisitions, cloud replication, multi-site metro clusters, and HCI could disrupt current BC/DR processes and how enterprises can use software-defined storage to fortify their BC/DR practices during these situations.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

DataCore Software Corporation

A Computer Weekly buyer's guide to data protection
sponsored by ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

What Hackers Know That You Don't: Identity Assurance in the Digital Age
sponsored by Evident
WHITE PAPER: Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. Attackers can combine info from now-infamous breaches with publicly available info to further compromise a user's identity to various ends. Download this white paper for practical tips to protect against hacks today.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Evident

How OneTrust Helps with the California Consumer Privacy Act (CCPA)
sponsored by OneTrust
WHITE PAPER: The California Consumer Privacy Act (CCPA) will take effect on January 1, 2020. Organizations that conduct business in California now need a scalable way to discover what data they hold, how it is used, and what third parties have access to it. Learn how with OneTrust, your organization can take a holistic approach to CCPA compliance.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

OneTrust

Deconstructing the Risk of Public Cloud: 5 Use Cases
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations have embraced public cloud platforms of all kinds in a big way, but the result is increased security complexity. In this white paper, discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 15 Aug 2019 | Published: 16 May 2019

Fortinet, Inc.

Improve Your Relationship with Data
sponsored by Virtru
EBOOK: No matter where you are in your cloud journey, there's still time to improve your relationship with your data. Becoming familiar with your data and knowing all the places it resides is a great place to start. Discover how to improve your relationship with data by building a compliance readiness plan today.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Virtru

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Effective Data Management for NoSQL and Hadoop Environments
sponsored by Cohesity
ANALYST REPORT: The following ESG paper digs into the most important data protection and orchestration considerations for Hadoop and NoSQL deployments. Access now for more on the impact of Hadoop and NoSQL data loss and how to establish more flexible protection for these workloads in your organization.
Posted: 13 Aug 2019 | Published: 31 Jul 2019

Cohesity

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

5 Critical Mistakes When Evaluating a Next-Generation Firewall
sponsored by Palo Alto Networks
RESOURCE: The firewall is the foundation of enterprise data security. All firewalls are not created equal, though, and no 2 organizations have the same needs, risks, and data flow. In this resource, explore 5 critical mistakes to avoid when evaluating a new next-generation firewall and selecting the perfect fit.
Posted: 12 Aug 2019 | Published: 24 Apr 2019

Palo Alto Networks

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Key Considerations for Compliance in the Cloud
sponsored by Virtru
RESOURCE: Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Safeguarding PeopleSoft Against Direct Deposit Theft
sponsored by Appsian
WHITE PAPER: In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems
1 - 25 of 1966 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement