IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
101 - 125 of 2097 Matches Previous Page  |  Next Page
Want to Get the Most from HCI? Pay Attention to Your Data Protection Strategy
sponsored by Veeam Software
WHITE PAPER: The following custom white paper demonstrates the data protection requirements of HCI and how to integrate protection with the platform to ensure your workloads are properly safeguarded. Download now to get started.
Posted: 28 Oct 2019 | Published: 30 Apr 2019

Veeam Software

Top 10 Best Practices for vSphere Backups
sponsored by Veeam Software
WHITE PAPER: This white paper describes 10 best practices for backing up VMware vSphere using Veeam Backup & Replication. Download the paper now to ensure you’re maximizing the value of your installs and to get expertise on how to execute app-aware backup, integrate storage-based snapshots into your Availability concept, and more.
Posted: 28 Oct 2019 | Published: 30 Jul 2019

Veeam Software

Secure by Design: A Roadmap to Cybersecurity Success
sponsored by Cyberfort
WHITE PAPER: The changing threat landscape, at first glance, seems complicated. However, there are methods to mitigate threats that will not adversely impact your business operations. In this white paper, learn how to assess your security posture and provide the tools necessary to enable your organization to take a more holistic approach to cybersecurity.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Cyberfort

Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 31 Aug 2019

IBM

Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 31 Aug 2019

IBM

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Vendor Evaluation: Data Resiliency Solutions
sponsored by Rubrik
ANALYST REPORT: This Forrester Research report dissects the requirements for more resilient data protection solutions and evaluates and ranks 10 backup providers against those requirements—including Rubrik, Commvault, Cohesity, Veeam, and 6 more.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Rubrik

KuppingerCole Report Leadership Compass Database and Big Data Security
sponsored by IBM
ANALYST REPORT: This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.
Posted: 24 Oct 2019 | Published: 30 Jun 2019

IBM

KuppingerCole Report Leadership Compass Database and Big Data Security
sponsored by IBM
ANALYST REPORT: This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

How to Avoid Epic Fails in Data Security Battlecard
sponsored by IBM
RESOURCE: Get a quick overview of the five most common data security failures that, if left unchecked, could lead to unforced errors and contribute to the next major data breach.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

How to Avoid Epic Fails in Data Security Battlecard
sponsored by IBM
RESOURCE: Get a quick overview of the five most common data security failures that, if left unchecked, could lead to unforced errors and contribute to the next major data breach.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

Putting Unstructured Data to Work
sponsored by IBM
EBOOK: This e-book will address a challenge close to the heart of many organizations: how to procure value from mountains of unstructured data. Download now to learn how to confront this challenge head-on using an intelligent data management solution and the tactics illustrated inside.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

Trends in Modern Data Protection
sponsored by IBM
ANALYST REPORT: In this report, ESG surveys the data protection landscape, examining backup trends and mandates, cloud backup and DR adoption, 7 techniques for data reuse, and more. Download now for these can't-miss takeaways and learn how to put them to use in your enterprise.
Posted: 24 Oct 2019 | Published: 31 Mar 2019

IBM

5 Epic Fails in Data Security
sponsored by IBM
WHITE PAPER: This paper looks at 5 of the most prevalent – and avoidable – data security missteps organizations are making today, and how these "epic fails" open them up to potentially disastrous attacks. Read on to see if your organization's data security practices are sound enough to face the pressure of today's threat landscape.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

IBM

5 Epic Fails in Data Security
sponsored by IBM
WHITE PAPER: This paper looks at 5 of the most prevalent – and avoidable – data security missteps organizations are making today, and how these “epic fails” open them up to potentially disastrous attacks. Read on to see if your organization’s data security practices are sound enough to face the pressure of today’s threat landscape.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

IBM

Forrester Report: Tackle The California Consumer Privacy Act Now
sponsored by IBM
ANALYST REPORT: With the adoption of the California Consumer Privacy Act (CCPA), California has once again taken the initiative among US states to lead on privacy. In less than 1 year, regulators in California will start enforcing the requirements of the CCPA. In this Forrester report, explore the main steps companies must take to kick off their CCPA preparation.
Posted: 23 Oct 2019 | Published: 08 Feb 2019

IBM

Forrester Report: Tackle The California Consumer Privacy Act Now
sponsored by IBM
ANALYST REPORT: With the adoption of the California Consumer Privacy Act (CCPA), California has once again taken the initiative among US states to lead on privacy. In less than 1 year, regulators in California will start enforcing the requirements of the CCPA. In this Forrester report, explore the main steps companies must take to kick off their CCPA preparation.
Posted: 23 Oct 2019 | Published: 08 Feb 2019

IBM

Building an Innovative Disaster Recovery Plan
sponsored by Druva
WHITE PAPER: The following paper will help you formulate an effective DR plan, with best practices, tools, and templates to keep in mind, and additionally introduces the advantages of integrating cloud-native backup and DRaaS into your plan. Read on now for the key takeaways to keep in mind as you evolve your company’s DR plans.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Druva

The Rise of Cloud: Why You Need a New Approach to Data Resiliency
sponsored by Druva
ANALYST REPORT: This Forrester Research report dissects the requirements for more resilient data protection solutions, and evaluates and ranks 10 backup providers against those requirements. Download this exclusive report to see how each provider measures up and to determine which one(s) best suit the needs of your organization.
Posted: 23 Oct 2019 | Published: 12 Sep 2019

Druva

IBM Security Guardium Analyzer Data Sheet
sponsored by IBM
PRODUCT OVERVIEW: In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

IBM Security Guardium Analyzer Data Sheet
sponsored by IBM
PRODUCT OVERVIEW: In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

From readiness to transformation: How to address privacy regulations and keep your data safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

From readiness to transformation: How to address privacy regulations and keep your data safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM
101 - 125 of 2097 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement