IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2023 Matches Previous Page  |  Next Page
Data Protection in a Multi-Cloud World
sponsored by Dell Technologies and Intel
RESOURCE: Relying on data protection solutions from multiple vendors can lead to increased data loss, downtime, and struggles when recovering data following a cyber-attack. Access this resource to learn how to enhance the protection and security of mission critical applications and across multi-cloud environments.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dell Technologies and Intel

Enhance the Safety and Security of Your People, Assets and Operations
sponsored by Dell Technologies and Intel
WHITE PAPER: For organizations looking to keep pace with today’s dynamic world, the addition of each new IoT device requires storage, security, and performance considerations. In this white paper, take a closer look at today’s IoT challenges and discover how Dell is working to address them. Learn more about Dell solutions powered by Intel®
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dell Technologies and Intel

Demystifying Security for Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: ‘Hyperscaling’ allows enterprises to build hybrid IT architectures and quickly launch applications. The issue with this increase in speed is the resulting deficiency in security. Bottlenecks can easily take the ‘hyper’ out of scaling. Read this white paper for a look at an updated security strategy that can keep pace with hyperscale.
Posted: 11 Aug 2020 | Published: 04 Aug 2020

Fortinet, Inc.

Powerful and secure data transmission as key element of IT security
sponsored by Rohde & Schwarz
WHITE PAPER: Organizations are becoming increasingly aware of the need to prioritize IT security in order to ensure protection grows at the same rate as productivity. However, the constantly changing nature of IT security can make it unclear where to start. This white paper provides an overview of the IT security fundamentals – read on to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020


Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by McAfee
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019


Cloud is the dream, don’t let risk and compliance be your nightmare
sponsored by Xtravirt
WHITE PAPER: Organizations worldwide are adopting cloud capabilities at an unprecedented rate in order to ensure flexibility and scalability in uncertain times. However, effective cloud environments require cloud-ready compliance and risk considerations. Download this white paper to evaluate and gauge your organization’s cloud security readiness.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Xtravirt

Cloud Insiders - Risk and Compliance in the Hybrid Cloud
sponsored by Xtravirt
WEBCAST: A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Xtravirt

Complexity in Cybersecurity Report
sponsored by IBM
ANALYST REPORT: Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.
Posted: 07 Aug 2020 | Published: 31 May 2019

IBM

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this NGFW white paper so that you may approach your CISO with a well-informed recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

Cloud Pak for Security Buyer's Guide
sponsored by IBM
WHITE PAPER: In cybersecurity, the term “platform” has become overused, making it difficult to cut through the noise and understand which factors matter in choosing the best option for your business. Download this buyer’s guide to find out what you should look for in a security platform.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

IBM

Data Security for the Way People Work
sponsored by Dell Technologies
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Dell Technologies

CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER: The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER: In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

CipherTrust Cloud Key Manager
sponsored by Thales
PRODUCT OVERVIEW: To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.
Posted: 05 Aug 2020 | Published: 30 Apr 2020

Thales

Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure
sponsored by Quest
WHITE PAPER: Read this white paper for guidance on how to meet the backup and recovery needs of container and hybrid virtualized environments, as well as how to find, and apply, the most suitable and flexible solution.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Quest

Enhancing the Modern Workplace with Hardware-Enforced Security
sponsored by Servium
WHITE PAPER: An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Servium

Cloud with Confidence: Re-Imagine Cloud Security
sponsored by Checkpoint Software Technologies
EGUIDE: According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Checkpoint Software Technologies

Tried and Tested: The New Paradigm in the Workplace
sponsored by NTT
ANALYST REPORT: The COVID-19 lockdown has forced the acceleration of companies' digital transformation agendas, with important advancements in employee engagement, productivity and security. In this IDC report, learn more about how the new paradigm or work is transforming the workplace, workforce and work culture.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

NTT

When Everything is Closed, Keep Your Business Open with Remote Access
sponsored by Aruba Networks
RESOURCE: When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

Making Apache Spark™ Better with Delta Lake
sponsored by DataBricks
EBOOK: For data engineers, building fast, reliable pipelines is only the beginning. Today, you also need to deliver clean, high quality data ready for downstream users to perform BI and ML. Read on to learn how the best big data engines like Apache Spark™ can be improved with the addition of the Delta Lake.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

DataBricks

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

5 Reasons Qlik and Snowflake Are Better Together: Automating the Data Warehouse for Faster Time-to-Insight
sponsored by Qlik
WHITE PAPER: How does Qlik’s Data Integration Platform enable Snowflake users to speed analytics projects, achieve greater agility and reduce risk – all while fully realizing the advantages of Snowflake’s cloud-built data platform? Download this eBook to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Qlik

Privileged Access Cloud Security For Dummies
sponsored by Thycotic
EBOOK: Cloud breaches have increased to 24% of all breaches per the 2020 Verizon Data Breach Investigations Report. 77% of these breaches involved compromised user credentials. Enter privileged access management (PAM). Understanding PAM is essential in giving users easy, secure cloud access, and so browsing this e-book may be beneficial.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

Threat Intelligence: Shrinking the Cybersecurity Data Gap
sponsored by Bitdefender
WHITE PAPER: The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender
1 - 25 of 2023 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info