IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1817 Matches Previous Page  |  Next Page
VMware International Unlimited Company VIDEO 3
sponsored by VMware International Unlimited Company
WEBCAST: No matter how strong the perimeter protecting your data center is, someone is going to find a way in. Today, there’s only one solution – trust no one. View this webinar featuring Forrester Senior Research Analyst, David Holmes as he and a panel of IT leaders break down how to apply the concepts of zero trust to data center infrastructure.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

VMware International Unlimited Company

WHERE IS ALL YOUR DATA AND WHO HAS ACCESS?
sponsored by SailPoint Technologies
RESEARCH CONTENT: This paper reviews a global research survey focusing on Identity and technology professionals to understand current trends around the management and governance of unstructured data. Download the report to uncover the results.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

TOPICS:  Data Security
SailPoint Technologies

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Mainframe Security & Compliance
sponsored by BROADCOM, Inc
PODCAST: 80% of the world’s mission-critical data is stored on mainframes. Threat actors are always hunting this data, so enterprises must work to compliantly keep this data secure. But where do they start? Listen to this podcast to learn more about mainframe security and compliance and the challenges enterprises face in "securing the world".
Posted: 26 Mar 2021 | Premiered: Mar 26, 2021

BROADCOM, Inc

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

COBALT IRON COMPASS®Data Protection for a Remote World
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Cobalt Iron

End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass
sponsored by Cobalt Iron
ANALYST REPORT: Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.
Posted: 22 Mar 2021 | Published: 30 Jun 2020

Cobalt Iron

Data Encryption and Authentication for Cloud Storage
sponsored by ESET
EGUIDE: As organizations migrate to the cloud, they’re choosing cloud storage as a more efficient and cost-effective method to store their data. But with this transition comes security risks that cannot be ignored – cloud storage is more vulnerable. Dive into this e-guide to learn how encryption and authentication can help mitigate these risks.
Posted: 22 Mar 2021 | Published: 16 Mar 2021

ESET

How A Wine And Spirits Distributor Protects Its Data And Reputation With Threat Hunting
sponsored by Cisco Systems, Inc.
CASE STUDY: Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.
Posted: 22 Mar 2021 | Published: 11 Feb 2021

Cisco Systems, Inc.

Marine Credit Union Bolsters Their Security With Cisco
sponsored by Cisco Systems, Inc.
CASE STUDY: Marine Credit Union had a tough mission in front of them: Build top-notch security on a budget. They had to defend their highly targeted data against online criminals and nation states with the goal of safeguarding their members’ financial information. View this case study to discover how Cisco helped Marine Credit Union achieve their goal.
Posted: 22 Mar 2021 | Published: 16 Feb 2021

Cisco Systems, Inc.

Magic Quadrant for Master Data Management Solutions
sponsored by TIBCO
WHITE PAPER: Access this Gartner Magic Quadrant for Master Data Management (MDM) Solutions to learn which MDM solutions offer features that make them top of the line, including workflow and business process management, data modeling abilities, data stewardship support, integration possibilities, and more.
Posted: 19 Mar 2021 | Published: 27 Jan 2021

TIBCO

Security In Adobe Experience Platform
sponsored by Adobe
WHITE PAPER: Adobe’s Experience Platform is the technology behind the Adobe Experience Cloud—designed to help centralize and standardize all data and create real-time customer profiles. Download this white paper for an in-depth overview of the security features built-in to the platform, and a closer look at Adobe’s overall security strategy.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

TOPICS:  Data Security
Adobe

Data quality emerges from Covid-19 more critical than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

ComputerWeekly.com

Enhancing Encryption Key Control and Data Security in Google Cloud Platform
sponsored by Arrow & Thales
DATA SHEET: Google Cloud’s External Key Manager (EKM) API helps organizations enhance control of and ownership over their encryption keys. To help organizations benefit from this enhanced control, Thales has integrated their CipherTrust Key Broker service with Google’s Cloud EKM. Use this data sheet to how this partnership could benefit you.
Posted: 08 Mar 2021 | Published: 30 Oct 2020


Prevent Ransomware Attacks from Disrupting your Business with CipherTrust Data Security Platform
sponsored by Arrow & Thales
WHITE PAPER: Cybersecurity Ventures predicted that ‘a business will fall victim to a ransomware attack every 11 seconds by 2021, and the estimated cost to all businesses put together will be around $20 billion’. Ransomware is on the rise, but by reading this white paper, you can learn how Thales’ CipherTrust Data Security Platform works to stop it.
Posted: 08 Mar 2021 | Published: 30 Oct 2020

TOPICS:  Data Security

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

Securing Microsoft Office 365 and Other Azure Applications with Ciphertrust Cloud Key Broker for Azure
sponsored by Arrow & Thales
WHITE PAPER: Today’s customers expect easy-to-use services, only paying for what they need. However, while they want more of these services, they either can’t or won’t give up control of their data for security reasons. Check out this white paper to see how the CipherTrust Cloud Key Broker for Azure aims to address this issue through key management.
Posted: 01 Mar 2021 | Published: 31 Aug 2020


Data Management: Assess, Don’t Guess.
sponsored by 1Touch.io
RESOURCE: Disparate endpoints make data management a challenge. Edge computing has not yet seen widespread adoption, so discovering, mapping and tracking your sensitive data in real-time (all while maintaining regulatory compliance) sounds real impossible. Jump into this resource to see how 1touch.io strives to give you the clearest view of your data.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

1Touch.io

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Inventa for Wealth Management
sponsored by 1Touch.io
DATA SHEET: With 1touch.io’s Inventa, an AI-based sustainable data discovery tool, firms can move forward with their own digital initiatives while effortlessly staying on top of privacy requirements. Read this paper to learn how your organization can ensure sustainable data discovery and reduce the burden on data science teams with Inventa.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

1Touch.io

Database and Big Data Security
sponsored by Imperva
ANALYST REPORT: This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

TOPICS:  Data Security
Imperva

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Conquering cloud security threats with awareness and tools
sponsored by SearchSecurity.com
EZINE: The global market for cloud security products and services is booming, and so are threats. Increasingly, a company must beware of nation-state hackers, though the problem of vulnerabilities caused by human error within the organization persists.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com

Getting the most from cyberthreat intelligence services
sponsored by SearchSecurity.com
EZINE: A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference. This issue also includes a feature on top CISO concerns for 2020, plus an interview with Cisco's CISO Steve Martino.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com
1 - 25 of 1817 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences