IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1926 Matches Previous Page  |  Next Page
Inside the Mind of a Hacker
sponsored by Irdeto
EBOOK: Cybercrime is hot business where hackers have the advantage. To combat the rising trend, all companies must be on top of their game. This eBook details what drives criminal hackers and how they go about realizing their goals. This eBook will give readers a better understanding of how to avoid being caught up in a cyberattack.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Irdeto

Karlsruhe City Hospital Transforms Audit-proof Long-term Archiving Processes
sponsored by iTernity
CASE STUDY: By downloading this study, you'll learn how HPE Converged Storage systems, controlled by iTernity iCAS—a software-defined archiving solution—enabled Karlsruhe City Hospital to respond flexibly and cost-effectively to increasing archiving needs.
Posted: 21 Feb 2019 | Published: 31 Dec 2016

TOPICS: 

Data Protection by the Numbers
sponsored by Veeam Software
EBOOK: This vendor-agnostic e-book serves as your guide to determining the right data backup and retention strategies for your organization based on RPOs, RTOs, SLAs, ROI, and the cost of downtime. Read it here.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Veeam Software

Loewe Modernizes Operations with High-Tech Archive for SAP
sponsored by iTernity
CASE STUDY: Loewe's most critical problem during their merger was replacing the SAP ECM archive system to relieve their staff of the expensive maintenance the old devices required and from undertaking a time-consuming migration. View the study to see how they achieved it.
Posted: 21 Feb 2019 | Published: 31 Jan 2019

TOPICS: 

How to Modernize Your SAP Archiving Infrastructure
sponsored by iTernity
WHITE PAPER: Download this paper to find out how to fulfill critical SAP archiving criteria using a software-defined archiving approach. Five business benefits and 4 areas in which the solution addresses compliance needs are inside.
Posted: 21 Feb 2019 | Published: 31 Dec 2018

TOPICS: 

Compliance for Business Data: Benefits of Software-defined Archiving
sponsored by iTernity
WHITE PAPER: This paper digs into the iTernity Compliant Archive Software (iCAS), which enables organizations to flexibly archive data regardless of its size to fulfill compliance requirements. Read on to learn 6 benefits of iCAS, how it differs from traditional archiving tools, and how it can help you simplify compliant data management.
Posted: 21 Feb 2019 | Published: 31 Dec 2018

TOPICS: 

Data is on the Move
sponsored by Dell and Intel®
RESOURCE: Download this infographic for statistics on data security and employee efficiency from Forrester.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

TOPICS: 
Dell and Intel®

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

TOPICS: 
Fidelis

File Sharing and Collaboration Leads to Security Gaps in Financial Services Firms
sponsored by BlackBerry
RESEARCH CONTENT: This research brief focuses on unstructured data, and the security risks present in many of the internal business processes that use it. A common misstep in financial institutions is the accidental sharing of sensitive files. In this research brief, explore how BlackBerry Workspace can help reduce the risk of sharing information.
Posted: 20 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
BlackBerry

iTernity iCAS Archiving Software Technical Overview
sponsored by iTernity
WHITE PAPER: With the iTernity Compliant Archiving Software (iCAS), you can store data flexibly and securely, and to properly fulfill manifold regulatory requirements. Read on to view the technical features and functionality detailed herein.
Posted: 20 Feb 2019 | Published: 31 Jan 2019

TOPICS: 

Sunrise Health Adopts VDI and Thin Client Endpoints
sponsored by Dell
WHITE PAPER: Download this case study to learn how a combination of thin clients and desktop virtualization helped one hospital streamline IT management, reduce waiting times, and enhance patient care – all while protecting sensitive patient data.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

TOPICS: 
Dell

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

TOPICS: 
Fidelis

How Does Software-defined Archiving Meet GDPR Requirements?
sponsored by iTernity
RESOURCE: View this resource for a side-by-side comparison of what the GDPR requires and how software-defined archiving tool iCAS fulfills those requirements, including the right to be forgotten, right of access by the data subject, and 6 more.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

TOPICS: 

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

TOPICS: 
ALTR

What Attacks Aren't You Seeing?
sponsored by Cisco Umbrella
RESOURCE: We work everywhere, yet traditional network security solutions still focus on protecting employees while on the corporate network. In this resource, learn about the risks of only relying on legacy defenses. Also, discover how Cisco Umbrella can help your organization by providing visibility into all internet requests across your network.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

TOPICS: 
Cisco Umbrella

Faster Deep Learning for AI and Analytics
sponsored by WekaIO
DATA SHEET: Access this datasheet for a software-defined storage solution built with data- and GPU-intensive AI and analytics apps in mind and can eliminate complex data copy operations, scale performance across the GPU cluster, and scale to the cloud.
Posted: 19 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
WekaIO

iTernity iCAS Reference Architectures
sponsored by iTernity
WHITE PAPER: Compliant archiving in the age of the GDPR, SOX, and HIPAA is often far from straightforward. As such, this technical white paper will provide you with reference architectures for the software-defined archiving solution iCAS that simplifies compliance-ready archiving.
Posted: 19 Feb 2019 | Published: 31 Dec 2018

TOPICS: 

UCAS Secures Millions of University Applications With Splunk Enterprise Security Analytics
sponsored by Splunk Services UK Ltd
CASE STUDY: The Universities and Colleges Admissions Service (UCAS) is the U.K.'s shared admissions service for higher education. They host a complex flow of sensitive, personal data. Therefore, it is important that they deliver faultless security assurance. In this case study, learn how UCAS was able to meet these security needs by adopting Splunk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Increase Visibility to Boost Security
sponsored by F5 Networks
WHITE PAPER: The increase of SSL/TLS traffic indicates that organizations are focused on protecting the data that flows through their internet-facing applications. However, the growth of malware hidden within that encrypted traffic is cause for concern. In this white paper, see how F5 Networks' SSL/TLS orchestration solution can keep your organization secure.
Posted: 18 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
F5 Networks

Computer Weekly – 19 February 2019: When is it best to stick with paper?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.
Posted: 15 Feb 2019 | Published: 19 Feb 2019

TOPICS: 
ComputerWeekly.com

Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

Consumption-based Data Management Providing Peace of Mind
sponsored by Veeam Software
WEBCAST: This webcast introduces you to consumption-based data management, a model that eliminates the need for overprovisioning while assuring supply as business needs grow. Tune in to learn how it differs from the cloud and 3 advantages of this strategy.
Posted: 15 Feb 2019 | Premiered: Jan 22, 2019

TOPICS: 
Veeam Software

Data Secrets Revealed - A Collection of Customer Stories
sponsored by Splunk Services UK Ltd
CASE STUDY: Download this e-book to explore how companies like Zillow, Domino's and Yelp are driving new, powerful and unique business insights.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Splunk Services UK Ltd

The Rise of the Intelligent AI-Powered Business
sponsored by Box
WHITE PAPER: Gartner has predicted an 800% growth in data volume in the next 5 years, 80% of which will be unstructured. Download this white paper to learn how companies can leverage machine learning and AI to get to grips with their content and do more with their data.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Box

Are You Protected from Downtime and Data Loss?
sponsored by Veeam Software
PRODUCT OVERVIEW: Download this brief for the details on HPE Nimble Storage and Veeam's flash-based, predictive backup solution. For hassle-free data availability and flash-accelerated data protection, keep reading.
Posted: 14 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Veeam Software
1 - 25 of 1926 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement